Checklist de BYOD y Seguridad de la Información
by Juan Sebastian Espinosa Trejos, from the Community
Esta checklist de BYOD ayuda a evaluar las políticas y procedimientos de seguridad informática cuando los colaboradores utilizan sus propios dispositivos. Incluye verificación de inventario de dispositivos, acuerdos y políticas de uso y acceso, copias de seguridad, gestión y destrucción de registros, planes de contingencia ante fallos de computación móvil y medidas de prevención y manejo de riesgos. Con esta guía podrá identificar brechas de cumplimiento, definir controles y responsabilidades y proteger los datos corporativos en entornos móviles.
With SafetyCulture you can
Digitize team workflows
Turn your workflows into digital templates or checklists so your team can conduct inspections efficiently and access them from any device.
Reduce manual errors
Help your team complete tasks more accurately with digital templates that minimize errors from manual processes.
Create and share inspection reports
Generate inspection reports and share them with your team and stakeholders to keep everyone informed.
About author
This community page makes available free workplace checklists and templates created by other users within the SafetyCulture community. SafetyCulture has re-published this content and where possible, has credited the original author. SafetyCulture has not verified the accuracy, reliability or suitability of any community content. You agree that your use of any of this content is in accordance with SafetyCulture’s Terms and Conditions.
