Overview

Security on devices that are able to access Yellow Dog resources are kept to the utmost security standards. This allows us to work in an efficient and secure manner to ensure customer are handled properly and with the utmost care.

Purpose

To establish guidelines for the acquisition, license management, and use of software on Yellow Dog Software approved hardware.

Scope

This applies to all software and hardware owned and operated by Yellow Dog Software.

Policy

All Yellow Dog hardware and software must be acquired in a way that is compliant with Yellow Dog Purchasing guidelines.

Software

  • Software for Yellow Dog Approved systems are to only be purchased by Yellow Dog IT Staff and only through Yellow Dog IT Staff approved vendors.

  • Installation will occur during predetermined hours and any changes will be documented and kept in file storage.

  • Software licenses are kept in the Yellow Dog IT file vault.

Hardware

  • Hardware for Yellow Dog Approved systems are to only be purchased by Yellow Dog IT Staff and only through Yellow Dog IT Staff approved vendors.

  • Installation will occur during predetermined hours and any changes will be documented and kept in the Yellow Dog IT file vault.