Skip Ribbon Commands
Skip to main content

Utility Links



  1. Ready Home
  2. Plan and Prepare

Cyber Safety Best Practices

Cross Browser Compatible Drop Down Menu - HTML & CSS | - Web Design Snippets, Tutorials and Resources

User Policy Examples

Computer System/Information Technology/Information System Policies – The core of any cyber security program consists of polices to ensure the safety of the users and their organization. The following policies are provided as examples and/or templates and may be adapted to meet the specific needs of an organization.

Photocopiers, Fax machines and Printers

Photocopiers, fax machines and printers may contain a hard drive or flash memory that stores digital images of the documents that are copied, transmitted or printed by the device. Businesses, public safety agencies and health care providers (organizations) use these devices regularly to process documents which often contain sensitive and confidential information.