The User’s Policy for data centers includes Hosted services for web, application using Data Center’s facility and Services for installing client equipments in the Data Center for client’s internet services, backup,
The guidelines, applicable to technology relating to the insurance sector of Pakistan, specify guiding principles for adoption of suitable cybersecurity measures for threat reduction, vulnerability reduction, deterrence and other cyber security measures. Effective July 1, 2020.
The European Parliament's approved Proposal for its Cybersecurity Act. Under the Act, the European Union Agency for Cybersecurity (“ENISA”) is granted a permanent mandate and is tasked to perform as the central provider of cybersecurity expertise and advice including the development of EU policy and law, engage in capacity building, support and cooperation on cybersecurity practices and response to the EU and its Member States, publish guidelines and best practices for cyrbersecurity and promote international cooperation as well as other duties. The Act also establishes the European cybersecurity certification framework (applicable across the EU) in an effort to create a common, certified cybersecurity approach throughout the EU which will also apply to Information and Communications Technologies (ICT) products and services (including the Internet of Things (IoT)).
A companion document to the National Institute of Standards and Technology (NIST) cybersecurity framework which sets forth the roadmap and agenda for further enhancement and revision of the framework and development, alignment and collaboration of cybersecurity related activities and responses.
This document sets out the 5-year 2019-2024 National ICT Policy and Strategy which provides the framework needed to leverage the benefits of ICTs to support the social and economic development of Somali society.
The Guidelines outline the minimum requirements that PSPs shall build upon in the development
and implementation of strategies, policies, procedures and related activities aimed at mitigating
Cybersecurity and risk management framework which defines protocols and procedures for routine and emergency scenarios, delegation of responsibilities, inter- and intra-company communication and cooperation both internal and external to an organization.
Extending the National Broadband Policy, the National ICT Policy and the National Cybersecurity Policy, this document develops an updated legal framework that safeguard the security of electronic systems and networks by criminalizing serious violations.
This document entitled “National Cybersecurity Strategy” has been prepared within the scope of the State’s efforts to support national security and develop the Egyptian society, and in order to monitor and confront emerging threats and future challenges in cyberspace and digital society.
The purpose of the National Institute of Standards and Technology (NIST) cybersecurity framework is to organize cybersecurity organization and set forth best practices and standards. Its five core functions are to Identify, Protect, Detect, Respond and Recover from cybersecurity attacks.
Legal Disclaimer: The content appearing on this site is for general information purposes only and made available on an "AS-IS" basis. The law is subject to change and no representation or warranty is made with regard to accuracy or fitness for a particular purpose.