INTRODUCTION Passwords form an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of our resources. All staff, including contractors and vendors with access to BDC systems and ...
INTRODUCTION The System Change Management Policy establishes a structured approach for managing changes to systems within our organization. This policy aims to ensure that changes are implemented efficiently, minimize risks to system integrity and ...
INTRODUCTION This document describes the general concepts of information technology usage & security to be practiced in BDC. It also describes the needs and responsibilities of the relevant parties with regards to the implementation, monitoring, and ...