S# No# | Document Name |
1 | Acceptable Usage Policy |
2 | Account Privacy Assessment Template |
3 | Admin Privileges and Mass Storage Device Enabling Procedure |
4 | Annual Supplier Security Checklist - Managed Services Supplier |
5 | Anti-Virus Policy |
6 | Application and Platform Risk Assessment and Risk Treatment Plan Template |
7 | Application and Platform Security Policy |
8 | Application Security Review Checklist |
9 | ARTIFICIAL INTELLIGENCE- PHILOSOPHY AND VALUE |
10 | Audit Workbook for Internal Security Audit Checklist |
11 | BCM Testing and Exercising Guidelines |
12 | BIO Threat Readiness |
13 | Bomb Threat Procedure |
14 | BT Incident Management Procedure |
15 | Business Continuity Management Framework |
16 | Business Continuity Management Policy |
17 | Centralized Exception Program Framework |
18 | Certificate of Closure |
19 | CESP Process |
20 | Clean Room ODC Checklist |
21 | Clear Screen and Desk Policy |
22 | Cloud POC Environments - Security Requirements |
23 | Cloud Security Audit Checklist |
24 | Cloud Virtual Desktops |
25 | Compliance Guidelines |
26 | Compliance Policy |
27 | Compliance Workbook |
28 | Cryptographic Control Policy |
29 | Customer Labs Baseline Standards |
30 | Cyber Security Management Framework |
31 | Cybercrime reporting procedure |
32 | Data Classification & Labeling FAQ |
33 | Data Classification and handling Policy |
34 | Data Disclosure Policy |
35 | Data Leakage Prevention Policy |
36 | Data Minimization Guidelines |
37 | Data Privacy - Personal Incident Response Plan |
38 | Data Privacy and Protection Policy |
39 | Data Privacy Management Framework |
40 | Data Subjects Rights Procedure - Associates |
41 | Data Subjects Rights Procedure - External Parties |
42 | Desktop Security Policy |
43 | Digital Forensic Policy |
44 | DMZ Equipment Policy |
45 | DPO Function Charter |
46 | Email Security Policy |
47 | Equipment and Media Handling Policy |
48 | Event based Risk Assessment Template |
49 | Event based Risk Assessment Template Guidelines |
50 | GDPR compliance checklist for auditor- ISG |
51 | Government Disclosure Request Template |
52 | GOVERNMENT DISCLOSURE REQUESTS POLICY |
53 | Guidelines for Encryption Key Management |
54 | Guidelines for Mobile Device Usage |
55 | Guidelines for Physical Security |
56 | Guidelines for Planning and Evacuation in Bomb Threat |
57 | Guidelines for Teleworking |
58 | Guidlines for Clear Screen and Clean Desk in ATT |
59 | Information Risk Management Methodology Guidelines |
60 | Information Security Risk Register Template |
61 | Information Security Audit Checklist - CS |
62 | Information Security Audit Checklist - TIM |
63 | Information Security Group Function Manual |
64 | Information Security Incident Management Policy |
65 | Information Security Incident Management Procedure |
66 | Information Security Policy for Supplier Relationships |
67 | Information Security RARTP Template |
68 | Information Security RARTP Template FAQ and Reference |
69 | Information Security Training and Awareness Policy |
70 | Instant Messenger Usage Policy |
71 | Internal Information Security Audit Procedure |
72 | Internal Security Audit Checklist for CAT Z Accounts - Internal Projects |
73 | Internet Usage Policy |
74 | ISG Cross Domain Risk Reporting Template |
75 | ISG Service Catalogue |
76 | ISMS Performance Evaluation Guidelines |
77 | ISMS Performance Evaluation Policy |
78 | IT Disaster Recovery Action Plan |
79 | LAB Assessment Guidelines |
80 | Lab Audit Checklist |
81 | Lab Inventory Template |
82 | Laptop Security Policy |
83 | List of Risks and References |
84 | Logical Identity Access Management Policy |
85 | Malicious Code Security Policy |
86 | Managed Services - Info Sec Ownership Review |
87 | Mobile Device Policy |
88 | Network Security Policy |
89 | Network Segmentation Authorization Matrix ISG |
90 | Non Disclosure Agreement and Code of Conduct |
91 | Non-IT Disaster Recovery Action Plan |
92 | Password Management Policy |
93 | Personal Desktop-Laptop Use Policy |
94 | Personnel Security Policy |
95 | Physical Security Policy |
96 | Physical Space Access and Authorization Guidelines |
97 | Physical Space Access and Authorization Process Policy |
98 | PM Asset Security Risk RA RTP BCP Guidelines |
99 | Privacy Control Checklist |
100 | Privacy Impact Assessment - Data Controller Suppliers |
101 | Privacy Impact Assessment-Controller |
102 | Privacy Impact Assessment-Processor |
103 | Procedure for BT Security Approvals to work at BT ODC |
104 | Procedure for Data Encryption |
105 | Procedure for Information Security in Projects |
106 | Resource Usage Agreement |
107 | Risk Assessment and Management Template for Buildings |
108 | Risk Assessment and Risk Treatment Plan Template Guidelines |
109 | Security Audit Scope for TechMahindra Subsidiaries |
110 | Security Monitoring Policy |
111 | Security Policy for Cloud Deployments |
112 | Security Policy for File Servers |
113 | Security Processes and Guidelines for Lab Operations and Management |
114 | Security Training Mandate Associate Base Policy |
115 | Server Security Policy |
116 | Setup of VLAN and Implementation of Controls |
117 | Social Media Guidelines |
118 | Social Media Policy |
119 | Subsidiary Integration Checklist |
120 | Subsidiary Integration Playbook |
121 | Subsidiary Security Policy |
122 | Supplier Security Checklist - Application Supplier |
123 | Supplier Security Checklist - Application Supplier(cloud base) |
124 | Supplier Security Checklist - Managed Service Supplier |
125 | Supplier Security checklist - Resource Supplier |
126 | Supplier Security Off boarding checklist - Data Access |
127 | Supplier Security Off boarding checklist - Non Data Access |
128 | Tech Mahindra Crisis Management Framework |
129 | Tech Mahindra Internal Labs Baseline Standards |
130 | TechM RoP Data Controller template |
131 | TechM RoP Data Processors template |
132 | TechM Security Overview |
133 | Teleworking Policy |
134 | VA and PT Information Gathering Sheet |
135 | VA and PT Policy |
136 | Visitor Escort and Access Control Policy |
137 | Vulnerability Management Policy |
138 | Websites Privacy Impact Assessment |
139 | Wireless Security Policy |
140 | Information Security Policy |