This policy serves as an introduction to the Information and Communications policies.

This policy defines organizational rights and user responsibilities related to ICT security

This policy provides the field offices with necessary information to be used in the preparation of their local mobile policies.

This policy establishes vulnerability management practices.

This policy provides users with guidelines for the selection and change of UNFPA IT hardware.

This policy defines the backup schedules for all the server groups.

This policy defines Shadow IT and provides steps to get approval for systems and solutions developed outside the control of MIS

This policy creates a framework for effective and efficient use of mobile phone services.

This policy defines ICT Staff responsibilities related to ICT security.

This policy addresses the assessment and management of risks associated with IT business process outsourcing.

Pages