This policy serves as an introduction to the Information and Communications policies.

This policy ensures that no unauthorized user can access any of the UNFPA servers with privileged accounts.

This policy provides stable technology software solutions that appropriately address business needs.

The MIS Policy Approval Process defines the process for creating or revising and approving a new MIS policy

This policy defines organizational rights and user responsibilities related to ICT security

This policy provides the field offices with necessary information to be used in the preparation of their local mobile policies.

This policy establishes vulnerability management practices.

This policy provides users with guidelines for the selection and change of UNFPA IT hardware.

This policy defines the backup schedules for all the server groups.

This policy defines Shadow IT and provides steps to get approval for systems and solutions developed outside the control of MIS