The standards for IT asset use and security supporting IT security policy 116, Use and Security of Information Technology Assets are now available on the Web :
- Schedule A – Acceptable Use of IT Assets
- Schedule B – Network Monitoring
- Schedule C – Software Licensing and Usage
- Schedule D – Password Protections
- Schedule E – Access Control
- Schedule F – Communications and Network
- Schedule G – Remote Access
- Schedule H – Change Management Control
- Schedule I – Virus Protection
- Schedule J – IT Asset Disposal
- Schedule K – Acceptable Encryption