Document Tag: security

G505 – Data Classification and Labeling

ITA Guideline G505 outlines procedures for data classification and labeling, ensuring state agencies properly identify and protect sensitive information.

Read Full Article

G330 – Best Practices for Utilizing Social Media Networking Sites

ITA Guideline G330 outlines best practices for state agencies using social media, ensuring effective communication while safeguarding privacy and security.

Read Full Article

S3230 – Security – Server Security Requirements

ITA Standard S3230 mandates comprehensive security measures for servers to ensure data protection and system integrity.

Read Full Article

S3220 – Security – Virtual Private Network

ITA Standard S3220 mandates the use of secure protocols and encryption for virtual private networks to ensure safe and private communication.

Read Full Article

S3131 – Network Services – Video Conference Dialing Plan

ITA Standard S3130 mandates security and operational protocols for video conferencing services to ensure secure and reliable communication.

Read Full Article

S3110 – Network Services – Internet/Intranet Web Browser

ITA Standard S3110 mandates security and operational protocols for web browsers to ensure safe and efficient internet/intranet access.

Read Full Article

S3100 – Network Services – Internet/Intranet Web Server

ITA Standard S3100 mandates security and operational protocols for internet/intranet web servers to ensure robust and secure network services.

Read Full Article

S2510 – Network Operating System

ITA Standard S2510 mandates the security and operational requirements for network operating systems to ensure reliability and protection.

Read Full Article

S2140 – Mobile Device Security Capabilities

ITA Standard S2140 mandates security measures for mobile devices used by state agencies, ensuring data protection and compliance.

Read Full Article

S2130 – Anti-Virus/Endpoint Security

ITA Standard S2130 mandates anti-virus and endpoint security measures for state agencies to protect systems from malware and cyber threats.

Read Full Article