Policy & Procedures
ITC-01 Acceptable Usage
ITC-02 Access Management
ITC-03 Antivirus and Antimalware
ITC-04 Archiving and Retention
ITC-05 Asset Management
ITC-06 Assets Classification and Ownership
ITC-07 Authentication
ITC-08 Backup
ITC-09 Business Continuity
ITC-10 Bring Your Own Device(BYOD)
ITC-11 Change Management
ITC-12 Clear Desk and Clear Screen
ITC-13 Cloud Security
ITC-14 Compliance and IPR
ITC-15 Configuration Management
ITC-16 Cryptographic
ITC-17 Electronic Messaging
ITC-18 Information Exchange
ITC-19 Information Security
ITC-20 Information Technology Risk Management Methodology
ITC-21 IS Incident Management
ITC-22 IT Service Management
ITC-23 Mobile Computing and Teleworking
ITC-24 Network Security
ITC-25 Physical and Environmental
ITC-26 Privacy Policy in UoS
ITC-27 Project Management
ITC-28 Supplier Management
ITC-29 System Acquisition and Development
ITC-30 Third Party Security
ITC-31 Vulnerability Patch Management
ITC-32 Wireless Security
ITC-33 Learning Management System
ITC-34 Web Hosting

