Third-Party Access Policy
Subscriber Content

This policy outlines procedures governing third-party access to company owned network and applications. Its purpose is to define security policies that apply to temporaries, contractors, consultants, and other third-parties, when such connectivity is necessary for business purposes. The policy covers physical and administrative requirements needed to manage secure network connectivity between a company and any third-party requiring access to a company’s computing resources.
According to this policy, third-party access should be in accordance with specific security policy requirements determined, based on business needs.