Project

General

Profile

Projects

Filters

Apply Clear

  • IT Policy, Standards & Guidelines

    IT POLICIES

    Establishes Tuntex IT governance groups, gives the Chief Information Technology, the authority & responsibility to oversee the IT Governance program, and aligns with IT Security assessment, to handle their data or services.This policy provides guidelines for establishing qualified Tuntex company to do business and what requirements or regulations should be imposed upon their operational processes.

    ...
    • Account Password Policy

      Standard for Account Passwords

      1. PURPOSE
      2. ...
    • Data Storage Policy and Guidelines

      Data Storage Policy and Guidelines

      Overview

      ...
    • E-Mail Setup Guideline

      Configuring E-Mail in Android Smartphone

      ...
    • Email Signature Policy

      Tuntex Email Signature Policy

       

      ...
    • GOVERNANCE, RISK AND COMPLIANCE POLICY (GRC)

      GOVERNANCE, RISK AND COMPLIANCE POLICY (GRC)

      Introduction

      ...
    • Identity and Access Management Policy

      Identity and Access Management Policy

       

      ...
    • Implement Chat and VOIP Client

      Project:

      Riot: A Distributed Way of Having CHAT and VOIP (Voice over Internet Protocol) Client.

      ...
    • Information Technology Incident Management Policy

      Information Technology Incident Management

      Policy Summary

      ...
    • PDAs and Other Mobile Devices Policy

      Security Policy for The use of Handheld Devices in Tuntex Environments

      The use of handheld devices is increasing in Tuntex environments, providing mobile services and constant connectivity to mobile workers. Due to the fact that handheld devices are recent and not yet properly managed, they present new threats to corporate assets. Handheld devices combine security challenges posed by laptops, removable storage (e.g. USB keys), and cameras.

      ...
    • Privacy Policy

      Tuntex Privacy Policy

      This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.

      ...
    • Threat and Vulnerability Management Policy

      Threat and Vulnerability Management Policy

      Policy Statement

      ...
    • Tuntex File Server Storage, Backup & Recovery

      Tuntex File Server

      The IT Division maintains a server that is used primarily as a space for group and staff with assigned cloud accounts to use as centralized storage for work related files and data. Work related files include items such as Word documents, Excel spreadsheets, PDF, images, or any other job critical data that is created.

      ...
    • TUNTEX Wi-Fi Policy & Disclaimer

      You are about to access the Internet through a wireless Internet access node (the "Service") operated by TUNTEX SYS.

      The purpose of the Service is: To provide free public wireless Internet access to visitors of TUNTEX SYS.

      ...
  • TUNTEX SYS IT SERVICE DESK

    What is an IT Service Desk?

    • The IT Service Desk is intended to be a primary point of engagement between users and an IT organization.
    • ...
    • Tuntex SYS Internet Policy

      TUNTEX SYS Computer Network and Internet Access Policy

      Disclaimer

      ...
    • What is extortionware?

      Extortionware is the latest stage in the evolution of ransomware. No longer content with simply encrypting a victim’s files, threat actors are increasingly using ransomware incidents as an opportunity to steal huge swathes of senditive data, which is then used as leverage in high-stakes extortion attempts.

      ...

Also available in: Atom