List of Procedures
PERSONAL DATA
(PL: DANE OSOBOWE)
DO - 01 Personal Data Protection Policy
DO - 01 Annex 02 Information Clause Templates - VERCOM Information Clauses
DO - 01 Annex 04 Record of Processing Activities at VERCOM
DO - 01 Annex 06 [Template] 20YYMMDD-X Personal Data Breach Report
DO - 01 Annex 08 Client Incident Reporting Procedure
DO - 01 Annex 09 Executive Procedure: Selection of New Supplier and Software
DO - 01 Annex 10 Data Subject Complaint Handling Procedure
DO - 01 Annex 11 Procedure for Informing Clients of Changes to Contractual Documents
DO - 02 IT System Management Instruction
DO - 02 Annex 01 Disk Wiping Protocol
DO - 03 Personal Data Risk Assessment Methodology
DO - 03 Annex 01 Risk Assessment Sheet
DO - 03 Annex 02 Supplier Assessment Questionnaire
DO - 03 Annex 03 Internal Supplier Assessment Questionnaire
DO - 04 Technical and Organizational Measures_ ISO
DORA PROCEDURES
DORA-01 ICT Third-Party Risk Management Policy
DORA-02 ICT Services Exit Strategy Procedure
DORA-03 Contractual Requirements for ICT Providers
INFORMATION SECURITY PROCEDURE (PBI)
PBI - 01 Information Security Process Manual
PBI - 01 Annex 01 Information Security Objectives
PBI - 01 Annex 02 Asset Inventory
PBI - 01 Annex 02-01 Vercom Inventory
PBI - 01 Annex 03 Business Continuity Plan (BCP) Framework
PBI - 01 Annex 03-02 Detailed BCP Test Report
PBI - 01 Annex 04 Context of the Organization
PBI - 01 Annex 05 Security Control Effectiveness Measurement
PBI - 01 Annex 06 VERCOM Change Management Policy
PBI - 01 Annex 06.01 Change Management
PBI - 01 Annex 06.02 System Development Life Cycle (SDLC)
PBI - 01 Annex 07 VERCOM Data Retention Procedure
PBI - 01 Annex 08 Business Impact Analysis (BIA) Sheet
PBI β 01 Annex 09 Test Plan with Test Scenario
PBI - 01 Annex 10 [CONFIDENTIAL] Disaster Recovery Plan
PBI - 02 Information Classification
PBI - 03 Security Incident Management
PBI - 03 Annex 01 Incident Register
PBI - 03 Annex 02 Event Report - TEMPLATE: Declaration of Personal Data Protection Incident at VERCOM
PBI - 03 Annex 03 Report Phishing
PBI - 03 Annex 04 Incident Reporting
PBI - 03 Annex 05 [CONFIDENTIAL] Post-Intrusion Analysis
PBI β 03 Annex 06 [CONFIDENTIAL] Guidelines and Definitions regarding Incident Response Capabilities at Vercom
PBI β 03 Annex 07 [CONFIDENTIAL] Incident Response Report
PBI - 03 Annex 08 Event Report
PBI - 03 Annex 09 - Executive Procedure - Detection of Anomalous Events on Client Account in the Platform
PBI - 04 Use of IT Resources by Users
PBI - 04 Annex 01 Access Management Instruction at VERCOM
PBI - 04 Annex 02 [CONFIDENTIAL] Security and Cryptographic Key Management Procedure
PBI β 04 Annex 03 External Media Request
PBI β 04 Annex 01-03 Access Rights
PBI - 04 Annex 01-04 Employee Statement - Access Card Receipt
PBI - 04 Annex 01-05 Laptop Handover Protocol
PBI - 04 Annex 01-06 Phone Handover Protocol
PBI - 04 Annex 01-07 Terms and Conditions for Use of Electronic Devices
PBI - 04 Annex 01-08 User Statement
PBI - 04 Annex 01-09 Authorization to Process Personal Data at Vercom S.A.
PBI - 04 Annex 01-12 Access Rights Review Report Template
PBI - 05 Use of Resources - Administrators
PBI - 05 Annex 01 Hardware Change Management Procedure
PBI - 05 Annex 01-01 - Change Request TEMPLATE
PBI - 05 Annex 02 [CONFIDENTIAL] Configuration Management
PBI - 06 Risk Assessment
PBI - 06 Annex 01 Risk Assessment Sheet
PBI - 07 Statement of Applicability [SoA]
PBI - 08 VERCOM Vulnerability Management Process
PBI β 08 Annex 01 Suggested Test Schedule
PBI β 08 Annex 02 [CONFIDENTIAL] Annual Audit Template
PBI β 08 Annex 03 Single Test Report Template
PBI β 08 Annex 04 [CONFIDENTIAL] Established List of Publicly Accessible Hosts and IPs
PBI β 08 Annex 05 [CONFIDENTIAL] Vulnerability Risk Assessment Sheet (Classified Internal IT Document)
PBI β 08 Annex 06 [CONFIDENTIAL] Vulnerability Register
PBI - 09 [CONFIDENTIAL] Backup Management Policy / Personal Data Management in Cloud Computing
PBI - 10 Procedure for the Use of Messengers and Online Collaboration Tools
PBI - 11 [CONFIDENTIAL] Secure Development Procedure
PBI - 12 Artificial Intelligence Tools Usage Policy [(II) PROTECTED INFORMATION]
PBI - 13 Identity and Guest Access Management at Vercom S.A.
PBI - 14 Password Management
PBI - 15 Communication Procedure at Vercom
PBI - 16 Business Partner Verification Policy
PBI - 17 Third-Party Data Sharing Policy
CLOUD SECURITY POLICY
(PL: POLITYKA BEZPIECZEΕSTWA CHMURY)
PCH - 01 Identification and Supervision of Legal and Formal Requirements
PCH - 01 Annex 01 Register of Legal Acts
PCH - 02 Cloud Security Policy
INTEGRATED MANAGEMENT SYSTEM PROCEDURE
(PL: PROCEDURA ZINTEGROWANEGO SYSTEMU ZARZΔDZANIA)
PSYS - 01 Internal Audits
PSYS - 01 Annex 01 Audit Schedule
PSYS - 01 Annex 02 Audit Report
PSYS - 02 Control of Documented Information
PSYS - 02 Annex 01 List of Procedures and Instructions
PSYS - 03 Corrective Actions and Non-Conformities
PSYS - 03 Annex 01 Corrective Action Sheet
ISMS Management Review Report
Last updated