This policy serves as an introduction to the Information and Communications policies.

This policy defines the backup schedules for all the server groups.

This policy defines Shadow IT and provides steps to get approval for systems and solutions developed outside the control of MIS

This policy creates a framework for effective and efficient use of mobile phone services.

This policy defines ICT Staff responsibilities related to ICT security.

This policy addresses the assessment and management of risks associated with IT business process outsourcing.

This policy ensures that no unauthorized user can access any of the UNFPA servers with privileged accounts.

This policy provides stable technology software solutions that appropriately address business needs.

The MIS Policy Approval Process defines the process for creating or revising and approving a new MIS policy

This policy defines organizational rights and user responsibilities related to ICT security

Pages