Do you need an IT service or Cloud Solution? – talk to us, we’re here to help

MAKE AN ENQUIRY

Policy and Procedure

Cyber Security
Data Recovery
Data Protection
Policy and Procedure
Pen Testing
IT Governance
Cyber Security Audit
Introducing CyberSmart

Every business will have a series of policies and procedures by which the business is guided. IT policy & procedure underpins most modern day operational activity and as such are an essential part of the business fabric.

Greenlight Computers Policy & Procedure Services

The Greenlight Computers consultants work with many of our clients to create suitable sets of policies and standard operating procedures relating to their use of IT.

The policies required by a business will be guided by the nature of the business but also legislation that looks to protect society in general, such as the forthcoming GDPR legislation.

With many years of experience, working with clients across many sectors Greenlight consultants have built an excellent knowledge of what your business needs. The key to policy and procedure development is to keep things fresh and communicate well to staff, a policy not followed is of little value.

The standard operating procedures for the business will be derived from the policy framework.

List of potential IT Policies

Listed here are some of the policies you may need to consider for your business, every business is unique and more emphasis may be attached to different aspects of your IT.

  • Acceptable Use Policy
  • Password Policy
  • Backup Policy
  • Network Access Policy
  • Incident Response Policy
  • Remote Access Policy
  • Virtual Private Network (VPN) Policy
  • Guest Access Policy
  • Wireless Policy
  • Third Party Connection Policy
  • Network Security Policy
  • Encryption Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Mobile Device Policy
  • Data Retention Policy
  • Email Policy
  • Application Deployment Policy

If you think the Greenlight team can assist with your cyber security governance, DR planning or anything else, please contact us.

Every business will have a series of policies and procedures by which the business is guided. IT policy & procedure underpins most modern day operational activity and as such are an essential part of the business fabric.

Greenlight Computers Policy & Procedure Services

The Greenlight Computers consultants work with many of our clients to create suitable sets of policies and standard operating procedures relating to their use of IT.

The policies required by a business will be guided by the nature of the business but also legislation that looks to protect society in general, such as the forthcoming GDPR legislation.

With many years of experience, working with clients across many sectors Greenlight consultants have built an excellent knowledge of what your business needs. The key to policy and procedure development is to keep things fresh and communicate well to staff, a policy not followed is of little value.

The standard operating procedures for the business will be derived from the policy framework.

List of potential IT Policies

Listed here are some of the policies you may need to consider for your business, every business is unique and more emphasis may be attached to different aspects of your IT.

  • Acceptable Use Policy
  • Password Policy
  • Backup Policy
  • Network Access Policy
  • Incident Response Policy
  • Remote Access Policy
  • Virtual Private Network (VPN) Policy
  • Guest Access Policy
  • Wireless Policy
  • Third Party Connection Policy
  • Network Security Policy
  • Encryption Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Mobile Device Policy
  • Data Retention Policy
  • Email Policy
  • Application Deployment Policy

If you think the Greenlight team can assist with your cyber security governance, DR planning or anything else, please contact us.

Cyber Security
Data Recovery
Data Protection
Policy and Procedure
Pen Testing
IT Governance
Cyber Security Audit