Yearly Archives: 2019

free ISMS gra­phic: Dis­clo­sure Con­trol Aut­ho­riza­ti­on Data-Owner

"Disclosure Control Authorization Data-Owner" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Forwarding control authorization data owner With this pictogram you can create understandable user policies, which are [...]

By |2022-11-06T09:45:32+01:0017.11.2019|ISMS tools|

free ISMS gra­phic: Dis­clo­sure con­trol aut­ho­riza­ti­on data owner

"Disclosure control authorization data owner" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Disclosure control authorization data owner With this pictogram you can create understandable user policies, which [...]

By |2022-11-06T09:45:38+01:0017.11.2019|ISMS tools|

free ISMS gra­phic: Con­fi­den­tia­li­ty agree­ment — NDA personal

"Confidentiality agreement - NDA personal" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the function "Save graphic as" of your browser to use this pictogram for your information security system. Figure: Confidentiality agreement - NDA - personal With this pictogram you can create understandable user policies, [...]

By |2022-11-06T09:45:44+01:0017.11.2019|ISMS tools|

free ISMS gra­phic: Con­fi­den­tia­li­ty agree­ment — NDA with company

"Confidentiality agreement - NDA with company" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the function "Save graphic as" of your browser to use this pictogram for your information security system. Figure: Confidentiality agreement - NDA - Company With this pictogram you can create understandable user [...]

By |2022-11-06T09:45:50+01:0017.11.2019|ISMS tools|

free ISMS gra­phic: Forbidden

"Forbidden" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Forbidden With this pictogram you can create understandable user policies, which are required for an ISMS according to ISO/IEC [...]

By |2022-11-06T09:46:02+01:0017.11.2019|ISMS tools|

free ISMS gra­phic: Cloud forbidden

"Cloud forbidden" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Cloud forbidden With this pictogram you can create understandable user policies, which are required for an ISMS according [...]

By |2022-11-06T09:46:15+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Cloud control

"Cloud control" or "controlled cloud" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Cloud control With this pictogram you can create understandable user policies, which are required for [...]

By |2022-11-06T09:46:47+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Cloud allo­wed with 2FA

"Cloud allowed with 2FA" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Cloud allowed with 2FA With this pictogram you can create understandable user policies, which are required [...]

By |2022-11-06T09:46:53+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Cloud allowed

"Cloud allowed" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Cloud allowed With this pictogram you can create understandable user policies, which are required for an ISMS according [...]

By |2022-11-06T09:46:58+01:0013.11.2019|ISMS tools|
Go to Top