diff --git a/access/access_control.html b/access/access_control.html index 5248070..0bcf232 100644 --- a/access/access_control.html +++ b/access/access_control.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Access Control","level":"1.3","depth":1,"next":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"previous":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/access_control.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Access Control","level":"1.3","depth":1,"next":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"previous":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/access_control.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/lullabot_vpn.html b/access/lullabot_vpn.html index 0e46168..7a80690 100644 --- a/access/lullabot_vpn.html +++ b/access/lullabot_vpn.html @@ -572,7 +572,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"next":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"previous":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/lullabot_vpn.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"next":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"previous":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/lullabot_vpn.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/password_managers.html b/access/password_managers.html index 95ab4db..695ca0e 100644 --- a/access/password_managers.html +++ b/access/password_managers.html @@ -568,7 +568,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Password Managers","level":"1.3.3","depth":2,"next":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"previous":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/password_managers.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Password Managers","level":"1.3.3","depth":2,"next":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"previous":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/password_managers.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/passwords.html b/access/passwords.html index b847b3d..f2bd26e 100644 --- a/access/passwords.html +++ b/access/passwords.html @@ -568,7 +568,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"next":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"previous":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/passwords.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"next":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"previous":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/passwords.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/shared_accounts.html b/access/shared_accounts.html index c990c42..793516f 100644 --- a/access/shared_accounts.html +++ b/access/shared_accounts.html @@ -578,7 +578,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Shared Accounts","level":"1.3.6","depth":2,"next":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"previous":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_accounts.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Shared Accounts","level":"1.3.6","depth":2,"next":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"previous":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_accounts.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/shared_passwords.html b/access/shared_passwords.html index 4e986f1..d982b5c 100644 --- a/access/shared_passwords.html +++ b/access/shared_passwords.html @@ -594,7 +594,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Shared Passwords","level":"1.3.5","depth":2,"next":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"previous":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_passwords.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Shared Passwords","level":"1.3.5","depth":2,"next":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"previous":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_passwords.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/two_factor_authentication.html b/access/two_factor_authentication.html index 8b88316..ac5d8fa 100644 --- a/access/two_factor_authentication.html +++ b/access/two_factor_authentication.html @@ -579,7 +579,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"next":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"previous":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/two_factor_authentication.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"next":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"previous":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/two_factor_authentication.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/appendix.html b/appendix/appendix.html index 3b5bb4a..27288a1 100644 --- a/appendix/appendix.html +++ b/appendix/appendix.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Appendix","level":"1.6","depth":1,"next":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"previous":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/appendix.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Appendix","level":"1.6","depth":1,"next":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"previous":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/appendix.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/device-checklist.html b/appendix/device-checklist.html index 22bdb21..4aa5f07 100644 --- a/appendix/device-checklist.html +++ b/appendix/device-checklist.html @@ -614,7 +614,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Device Checklist","level":"1.6.2","depth":2,"next":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"previous":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/device-checklist.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Device Checklist","level":"1.6.2","depth":2,"next":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"previous":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/device-checklist.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/iso-27001.html b/appendix/iso-27001.html index e222b0a..2b4599f 100644 --- a/appendix/iso-27001.html +++ b/appendix/iso-27001.html @@ -1040,7 +1040,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"next":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"path":"policy/signature.md","ref":"policy/signature.md","articles":[]},"previous":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/iso-27001.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"next":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"path":"policy/signature.md","ref":"policy/signature.md","articles":[]},"previous":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/iso-27001.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/links.html b/appendix/links.html index f2e8a5a..5f95103 100644 --- a/appendix/links.html +++ b/appendix/links.html @@ -563,7 +563,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"next":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"previous":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/links.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"next":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"previous":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/links.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/cloud.html b/communications/cloud.html index 42c0055..1985416 100644 --- a/communications/cloud.html +++ b/communications/cloud.html @@ -607,7 +607,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"next":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"previous":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/cloud.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"next":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"previous":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/cloud.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/communications.html b/communications/communications.html index d7e2fc2..51fddcf 100644 --- a/communications/communications.html +++ b/communications/communications.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Communications","level":"1.5","depth":1,"next":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"previous":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/communications.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Communications","level":"1.5","depth":1,"next":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"previous":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/communications.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/email.html b/communications/email.html index 5b87fd4..f3483c7 100644 --- a/communications/email.html +++ b/communications/email.html @@ -594,7 +594,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Email Security","level":"1.5.1","depth":2,"next":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"previous":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Email Security","level":"1.5.1","depth":2,"next":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"previous":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/email_groups.html b/communications/email_groups.html index d043e1c..8c41c67 100644 --- a/communications/email_groups.html +++ b/communications/email_groups.html @@ -577,7 +577,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Client Email Groups","level":"1.5.3","depth":2,"next":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"previous":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email_groups.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Client Email Groups","level":"1.5.3","depth":2,"next":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"previous":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email_groups.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/gpg.html b/communications/gpg.html index 4808686..5b556bb 100644 --- a/communications/gpg.html +++ b/communications/gpg.html @@ -608,7 +608,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"next":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"previous":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/gpg.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"next":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"previous":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/gpg.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/slack.html b/communications/slack.html index 25d2ca5..3c6a763 100644 --- a/communications/slack.html +++ b/communications/slack.html @@ -576,7 +576,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Slack Channels","level":"1.5.4","depth":2,"next":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"previous":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/slack.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Slack Channels","level":"1.5.4","depth":2,"next":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"previous":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/slack.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/index.html b/index.html index 499cb79..2bff57b 100644 --- a/index.html +++ b/index.html @@ -553,7 +553,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"next":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"README.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":".","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"next":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"README.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":".","book":{"language":""}}); }); diff --git a/physical/acceptable_use.html b/physical/acceptable_use.html index 8de162a..3ad66aa 100644 --- a/physical/acceptable_use.html +++ b/physical/acceptable_use.html @@ -586,7 +586,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"next":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"previous":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/acceptable_use.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"next":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"previous":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/acceptable_use.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/backups.html b/physical/backups.html index 3dd39a5..8118e6b 100644 --- a/physical/backups.html +++ b/physical/backups.html @@ -578,7 +578,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Backups","level":"1.4.4","depth":2,"next":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"previous":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/backups.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Backups","level":"1.4.4","depth":2,"next":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"previous":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/backups.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/device.html b/physical/device.html index aab432d..15e3fee 100644 --- a/physical/device.html +++ b/physical/device.html @@ -575,7 +575,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Device Maintenance","level":"1.4.7","depth":2,"next":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"previous":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/device.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Device Maintenance","level":"1.4.7","depth":2,"next":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"previous":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/device.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/hard-drive-encryption.html b/physical/hard-drive-encryption.html index 92db810..a912835 100644 --- a/physical/hard-drive-encryption.html +++ b/physical/hard-drive-encryption.html @@ -564,7 +564,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"next":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"previous":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/hard-drive-encryption.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"next":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"previous":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/hard-drive-encryption.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/locking.html b/physical/locking.html index 8a62920..0e1097c 100644 --- a/physical/locking.html +++ b/physical/locking.html @@ -571,7 +571,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"next":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"previous":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/locking.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"next":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"previous":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/locking.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/lost-devices.html b/physical/lost-devices.html index 16bf39d..226e0ad 100644 --- a/physical/lost-devices.html +++ b/physical/lost-devices.html @@ -624,7 +624,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"next":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"previous":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/lost-devices.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"next":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"previous":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/lost-devices.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/malware.html b/physical/malware.html index 62f15b3..e105133 100644 --- a/physical/malware.html +++ b/physical/malware.html @@ -628,7 +628,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"next":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"previous":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/malware.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"next":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"previous":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/malware.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/physical.html b/physical/physical.html index 64621c7..c2d8297 100644 --- a/physical/physical.html +++ b/physical/physical.html @@ -558,7 +558,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Physical Security","level":"1.4","depth":1,"next":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"previous":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/physical.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Physical Security","level":"1.4","depth":1,"next":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"previous":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/physical.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/policy/leadership.html b/policy/leadership.html index e418995..dd5495f 100644 --- a/policy/leadership.html +++ b/policy/leadership.html @@ -577,7 +577,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Leadership and Review","level":"1.2","depth":1,"next":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"previous":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"path":"README.md","ref":"README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/leadership.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Leadership and Review","level":"1.2","depth":1,"next":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"previous":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"path":"README.md","ref":"README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/leadership.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/policy/signature.html b/policy/signature.html index f45434d..7255e66 100644 --- a/policy/signature.html +++ b/policy/signature.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"previous":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/signature.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"previous":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/signature.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/security.pdf b/security.pdf index a8dc1a2..fe6501e 100644 Binary files a/security.pdf and b/security.pdf differ