| Corporate Philosophy on Security |
| Configuration of the Operating Systems by Divisions |
| Configuration of the Databases for each System by Division |
| Configuration of Applications by Database and System for Each Division |
| Configuration of Single Sign-on Utility |
| Composition of Certificates of Authority |
| USERID Guidelines for a Database Account |
| USERID Guidelines for an Operating System Account |
| Password Guidelines for a Database Account |
| Password Guidelines for an Operating System Account |
| Operating System Access Types |
| Database Access Types |
| Authorization for Establishment of User Accounts |
| Establishing a USERID for a Database |
| Establishing a USERID for an Operating System |
| User AdministrationAccounts Creation |
| User AdministrationAppropriate Roles by Application |
| User AdministrationAppropriate Views by Application |
| User AdministrationAdministrator Privileges |
| User Administrationfor Applications |
| Establishing Access to an Application |
| Revoking Access to an Application |
| Revoking Access to an Application for People Who Leave the Company |
| Removing Access to a USERID for an Operating System Account |
| Removing Access to a USERID for a Database Account |
| Notification of Termination |
| Revoking Access for Abruptly Terminated Employees |
| Transferring Staff to Another Group Within a Division |
| Transferring Staff to Another Group Outside of a Division |
| Reinstating a USERID |
| File Security Guidelines |
| Restricting Access to Systems |
| Restricting Access to Databases |
| Security Audits for Operating Systems |
| Security Audits for Databases |
| Time Schedule for Security Plan Reviews |