Projects
- IT Policy, Standards & Guidelines
IT POLICIES
Establishes Tuntex IT governance groups, gives the Chief Information Technology, the authority & responsibility to oversee the IT Governance program, and aligns with IT Security assessment, to handle their data or services.This policy provides guidelines for establishing qualified Tuntex company to do business and what requirements or regulations should be imposed upon their operational processes.
...- Account Password Policy
Standard for Account Passwords
- PURPOSE ...
- Data Storage Policy and Guidelines
Data Storage Policy and Guidelines
Overview
... - E-Mail Setup Guideline
Configuring E-Mail in Android Smartphone
... - Email Signature Policy
Tuntex Email Signature Policy
- GOVERNANCE, RISK AND COMPLIANCE POLICY (GRC)
GOVERNANCE, RISK AND COMPLIANCE POLICY (GRC)
Introduction
... - Identity and Access Management Policy
Identity and Access Management Policy
- Implement Chat and VOIP Client
Project:
Riot: A Distributed Way of Having CHAT and VOIP (Voice over Internet Protocol) Client.
... - Information Technology Incident Management Policy
Information Technology Incident Management
Policy Summary
... - PDAs and Other Mobile Devices Policy
Security Policy for The use of Handheld Devices in Tuntex Environments
The use of handheld devices is increasing in Tuntex environments, providing mobile services and constant connectivity to mobile workers. Due to the fact that handheld devices are recent and not yet properly managed, they present new threats to corporate assets. Handheld devices combine security challenges posed by laptops, removable storage (e.g. USB keys), and cameras.
... - Privacy Policy
Tuntex Privacy Policy
This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.
... - Threat and Vulnerability Management Policy
Threat and Vulnerability Management Policy
Policy Statement
... - Tuntex File Server Storage, Backup & Recovery
Tuntex File Server
The IT Division maintains a server that is used primarily as a space for group and staff with assigned cloud accounts to use as centralized storage for work related files and data. Work related files include items such as Word documents, Excel spreadsheets, PDF, images, or any other job critical data that is created.
... - TUNTEX Wi-Fi Policy & Disclaimer
You are about to access the Internet through a wireless Internet access node (the "Service") operated by TUNTEX SYS.
The purpose of the Service is: To provide free public wireless Internet access to visitors of TUNTEX SYS.
...
- TUNTEX SYS IT SERVICE DESK
What is an IT Service Desk?
- The IT Service Desk is intended to be a primary point of engagement between users and an IT organization. ...
- Tuntex SYS Internet Policy
TUNTEX SYS Computer Network and Internet Access Policy
Disclaimer
... - What is extortionware?
Extortionware is the latest stage in the evolution of ransomware. No longer content with simply encrypting a victim’s files, threat actors are increasingly using ransomware incidents as an opportunity to steal huge swathes of senditive data, which is then used as leverage in high-stakes extortion attempts.
...
Also available in: Atom