Search
Policy Areas
Filter and Sort

Showing 1 - 10 of 12 results

List of UNDP Systems and Tools for Electronic Records and Approvals

List of UNDP Systems and Tools for Electronic Records and Electronic Approvals Current solutions Tool / Solution E- Record Repository Electronic Approval Authenticity An electronic record or electronic approval is considered to be authentic if it can be proved that it was not modified, altered or otherwise compromised after it was placed. Integrity The integrity of an electronic approval refers …

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Electronic Signatures Policy

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Bring Your Own Device and Acceptable Usage of ICT Resources

Annex A - Principles for Allocation and Termination of Access Credentials to UNDP ICT Systems and Resources

ANNEX A – Principles for Allocation and Termination of Access Credentials to UNDP ICT Systems and Resources 1. All UNDP personnel, regardless of contract modality will be given basic access to corporate resources and communication tools through the provision of an individual UNDP email account. All new personnel will be provided with the necessary email accounts upon signature of their contract …

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Bring Your Own Device and Acceptable Usage of ICT Resources

Annex C - Uses of Mobile Devices within UNDP

ANNEX C: Uses of Mobile Devices[footnoteRef:1] within UNDP [1: A mobile device is a small, typically hand-held computing device, having a display screen with touch input and/or a miniature keyboard and a wireless networking capability. Laptops, tablets and smart phones would be considered mobile devices.] Bring Your Own Device 1. In principle, use of personal (staff-owned) mobile phone is …

Content Type: Document Document Type: Guide Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Bring Your Own Device and Acceptable Usage of ICT Resources

ICT Disaster Recovery Standards for UNDP Offices

ICT Disaster Recovery Standards for UNDP Offices   Structure Element - Description 1. Information systems operated by UNDP are critical assets for the organization to fulfil its mission. There are always threats, both natural and man-made, which can damage or disable critical information systems. Business Continuity (BC) and Disaster Recovery (DR) planning attempts to address these issues. 2. …

Content Type: Document Document Type: Policy Effective Date: 03-01-2023 Planned Review Date: 31-12-2024 Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: ICT Disaster Recovery Standards for UNDP Offices

System Logon Banner Standards

System Logon Banner Standards   Page Content Structure Element - Description    1. The Bureau for Management Services, Information and Technology Management (ITM) recommends that UNDP enlists the use of warning banners on laptop/desktop and server systems to notify users that they be subject to monitoring.   Scope   2. This policy applies to everyone using a UNDP computer (defined as any computer …

Content Type: Document Document Type: Policy Effective Date: 27-07-2016 Planned Review Date: 31-12-2024 Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: System Logon Banner Standards

Content Type: Document Document Type: Policy Effective Date: 01-12-2022 Planned Review Date: 31-12-2024 Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Bring Your Own Device and Acceptable Usage of ICT Resources

Information Classification and Handling

Information Classification and Handling Policy Introduction Information acquired, created, processed, stored, maintained or disseminated by UNDP (“Information”) is one of the Organization’s most valuable assets and is an integral part of every business process. A single compromise in Information security can have significant consequences for the Organization, including financial implications, …

Content Type: Document Document Type: Policy Effective Date: 26-07-2022 Planned Review Date: 31-12-2024 Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Information Classification and Handling

Electronic Signatures Policy

Policy on Electronic Signatures 1. Introduction 1. Using electronic signatures can help eliminate reliance on paper processes by replacing handwritten signatures with their electronic equivalents when this is permitted. Eliminating paper is both ecologically friendly, cost effective, and makes UNDP’s business processes more efficient. 1. The purpose of this Policy is to guide UNDP units in their …

Content Type: Document Document Type: Policy Effective Date: 01-12-2022 Planned Review Date: 31-12-2024 Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Electronic Signatures Policy

ICT Security Policy

Information Security Policy 1. The Information Security Policy sets out the basis for UNDP in protecting the confidentiality, integrity, and availability of its data, for classifying and handling confidential information, and for dealing with breaches of this Policy.  2. The Information Security Management System (ISMS) stipulated by ISO 27001 requires a comprehensive Information Security Policy …

Content Type: Document Document Type: Policy Effective Date: 30-06-2021 Planned Review Date: 31-12-2024 Policy Area: Information and Communications Technology Policy Chapter: ICT Security Policy: Information Security Policy