~3-page information security policy template on audit trails, security logs and so on.
Audit trails, security logs and other records of key transactions and activities are an important element of the information risk management framework, for both automated IT systems and manual processes (e.g. visitor logs, keyholder records). The security and other requirements must be determined and satisfied in order for them to be valuable controls - for instance, they generally need to be protected against unauthorised access, tampering or deletion.
Supplied as an MS Word document, readily customised for your organisation's specific situation.
top of page
bottom of page