Information Security Group
|
Home > Policy Guidebook > Policy Data Links

Policy Data

Please refer to ISG policies available on BMS for further information

S# No#Document Name
1Acceptable Usage Policy
2Account Privacy Assessment Template
3Admin Privileges and Mass Storage Device Enabling Procedure
4Annual Supplier Security Checklist - Managed Services Supplier
5Anti-Virus Policy
6Application and Platform Risk Assessment and Risk Treatment Plan Template
7Application and Platform Security Policy
8Application Security Review Checklist
9ARTIFICIAL INTELLIGENCE- PHILOSOPHY AND VALUE
10Audit Workbook for Internal Security Audit Checklist
11BCM Testing and Exercising Guidelines
12BIO Threat Readiness
13Bomb Threat Procedure
14BT Incident Management Procedure
15Business Continuity Management Framework
16Business Continuity Management Policy
17Centralized Exception Program Framework
18Certificate of Closure
19CESP Process
20Clean Room ODC Checklist
21Clear Screen and Desk Policy
22Cloud POC Environments - Security Requirements
23Cloud Security Audit Checklist
24Cloud Virtual Desktops
25Compliance Guidelines
26Compliance Policy
27Compliance Workbook
28Cryptographic Control Policy
29Customer Labs Baseline Standards
30Cyber Security Management Framework
31Cybercrime reporting procedure
32Data Classification & Labeling FAQ
33Data Classification and handling Policy
34Data Disclosure Policy
35Data Leakage Prevention Policy
36Data Minimization Guidelines
37Data Privacy - Personal Incident Response Plan
38Data Privacy and Protection Policy
39Data Privacy Management Framework
40Data Subjects Rights Procedure - Associates
41Data Subjects Rights Procedure - External Parties
42Desktop Security Policy
43Digital Forensic Policy
44DMZ Equipment Policy
45DPO Function Charter
46Email Security Policy
47Equipment and Media Handling Policy
48Event based Risk Assessment Template
49Event based Risk Assessment Template Guidelines
50GDPR compliance checklist for auditor- ISG
51Government Disclosure Request Template
52GOVERNMENT DISCLOSURE REQUESTS POLICY
53Guidelines for Encryption Key Management
54Guidelines for Mobile Device Usage
55Guidelines for Physical Security
56Guidelines for Planning and Evacuation in Bomb Threat
57Guidelines for Teleworking
58Guidlines for Clear Screen and Clean Desk in ATT
59Information Risk Management Methodology Guidelines
60Information Security Risk Register Template
61Information Security Audit Checklist - CS
62Information Security Audit Checklist - TIM
63Information Security Group Function Manual
64Information Security Incident Management Policy
65Information Security Incident Management Procedure
66Information Security Policy for Supplier Relationships
67Information Security RARTP Template
68Information Security RARTP Template FAQ and Reference
69Information Security Training and Awareness Policy
70Instant Messenger Usage Policy
71Internal Information Security Audit Procedure
72Internal Security Audit Checklist for CAT Z Accounts - Internal Projects
73Internet Usage Policy
74ISG Cross Domain Risk Reporting Template
75ISG Service Catalogue
76ISMS Performance Evaluation Guidelines
77ISMS Performance Evaluation Policy
78IT Disaster Recovery Action Plan
79LAB Assessment Guidelines
80Lab Audit Checklist
81Lab Inventory Template
82Laptop Security Policy
83List of Risks and References
84Logical Identity Access Management Policy
85Malicious Code Security Policy
86Managed Services - Info Sec Ownership Review
87Mobile Device Policy
88Network Security Policy
89Network Segmentation Authorization Matrix ISG
90Non Disclosure Agreement and Code of Conduct
91Non-IT Disaster Recovery Action Plan
92Password Management Policy
93Personal Desktop-Laptop Use Policy
94Personnel Security Policy
95Physical Security Policy
96Physical Space Access and Authorization Guidelines
97Physical Space Access and Authorization Process Policy
98PM Asset Security Risk RA RTP BCP Guidelines
99Privacy Control Checklist
100Privacy Impact Assessment - Data Controller Suppliers
101Privacy Impact Assessment-Controller
102Privacy Impact Assessment-Processor
103Procedure for BT Security Approvals to work at BT ODC
104Procedure for Data Encryption
105Procedure for Information Security in Projects
106Resource Usage Agreement
107Risk Assessment and Management Template for Buildings
108Risk Assessment and Risk Treatment Plan Template Guidelines
109Security Audit Scope for TechMahindra Subsidiaries
110Security Monitoring Policy
111Security Policy for Cloud Deployments
112Security Policy for File Servers
113Security Processes and Guidelines for Lab Operations and Management
114Security Training Mandate Associate Base Policy
115Server Security Policy
116Setup of VLAN and Implementation of Controls
117Social Media Guidelines
118Social Media Policy
119Subsidiary Integration Checklist
120Subsidiary Integration Playbook
121Subsidiary Security Policy
122Supplier Security Checklist - Application Supplier
123Supplier Security Checklist - Application Supplier(cloud base)
124Supplier Security Checklist - Managed Service Supplier
125Supplier Security checklist - Resource Supplier
126Supplier Security Off boarding checklist - Data Access
127Supplier Security Off boarding checklist - Non Data Access
128Tech Mahindra Crisis Management Framework
129Tech Mahindra Internal Labs Baseline Standards
130TechM RoP Data Controller template
131TechM RoP Data Processors template
132TechM Security Overview
133Teleworking Policy
134VA and PT Information Gathering Sheet
135VA and PT Policy
136Visitor Escort and Access Control Policy
137Vulnerability Management Policy
138Websites Privacy Impact Assessment
139Wireless Security Policy
140Information Security Policy
Copyright © Tech Mahindra Limited. All Rights Reserved