Академический Документы
Профессиональный Документы
Культура Документы
yes partly no
17. Are all the attempts for unjustified login and exceeding
the authorisation recorded and reviewed?
(this should be regulated by an internal directive)
38. Have the safety rules be set for using Internet at work?
40. Has the emergency procedure been drafted in case of the IT breakdown
(alarm plan, emergency measures and relevant information requirements
together with persons accountable)?
42. Once the computer virus attacks, are the procedure and measures
formulated in writing?
43. Has an adequate insurance policy for the IT system been contracted?
(fire, natural disaster, theft, data carriers, operation breakdowns)