Overview
Security on devices that are able to access Yellow Dog resources are kept to the utmost security standards. This allows us to work in an efficient and secure manner to ensure customer are handled properly and with the utmost care.
Purpose
To establish guidelines for the acquisition, license management, and use of software on Yellow Dog Software approved hardware.
Scope
This applies to all software and hardware owned and operated by Yellow Dog Software.
Policy
All Yellow Dog hardware and software must be acquired in a way that is compliant with Yellow Dog Purchasing guidelines.
Software
Software for Yellow Dog Approved systems are to only be purchased by Yellow Dog IT Staff and only through Yellow Dog IT Staff approved vendors.
Installation will occur during predetermined hours and any changes will be documented and kept in file storage.
Software licenses are kept in the Yellow Dog IT file vault.
Hardware
Hardware for Yellow Dog Approved systems are to only be purchased by Yellow Dog IT Staff and only through Yellow Dog IT Staff approved vendors.
Installation will occur during predetermined hours and any changes will be documented and kept in the Yellow Dog IT file vault.