White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Information security incident reporting policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    Make sure your employees know how to spot potential security breaches and how they should respond. This policy describes the signs that might point to a security incident and offers guidelines on the steps they should take. From the policy: Summary Confidential information must be kept secure to ...

    View This Now
  • Employee termination policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    Whether due to resignation, layoff, or firing, separating employees from the business is never a pleasant process. Even so, it’s critical to follow a systematic procedure to ensure that all necessary measures are taken. This policy provides guidelines for disabling former employee access, reclaiming company equipment, and finalizing payroll/benefits details. ...

    View This Now
  • Ergonomics policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    A safe and healthy work environment provides the foundation for all employees to be at their most productive. Not only does it promote productivity in the workforce, it also helps prevent accidents, lawsuits, and in extreme cases, serious injury and potentially loss of life. This policy establishes procedures to help ...

    View This Now
  • IT hardware procurement policy

    Tools & Templates // Apr 2017 // provided by Tech Pro Research

    A strong hardware procurement policy will ensure that requirements are followed and that all purchases are subject to the same screening and approval processes. This comprehensive policy covers the essential aspects of the purchasing process. From the policy: Summary There are many similarities between purchasing software and hardware—evaluations, ...

    View This Now
  • Software quality control policy

    Tools & Templates // Apr 2017 // provided by Tech Pro Research

    Quality control is an integral part of the software development process that ensures that a finished product meets expectations through predictable and peer-checked design methods. This policy defines quality control measures to make the software development process as efficient and successful as possible. From the policy: Summary ...

    View This Now
  • Identity theft protection policy

    Tools & Templates // Apr 2017 // provided by Tech Pro Research

    Help protect your employees and customers from identity theft. This policy outlines precautions for reducing risk, signs to watch out for, and steps to take if you suspect identity theft has occurred. The companion download, Lunch and learn: Dealing with the risks of identity theft, provides a ready-made PowerPoint ...

    View This Now
  • Employee non-compete agreement policy

    Tools & Templates // Mar 2017 // provided by Tech Pro Research

    Don’t let your valuable corporate assets and proprietary information walk out the door when an employee leaves the company. This non-compete agreement defines what knowledge and skills they can—and can’t--take with them if they accept another job. From the policy: Employers across many industries often use a non-compete ...

    View This Now
  • BYOD (bring-your-own-device) policy

    Tools & Templates // Mar 2017 // provided by Tech Pro Research

    This policy outlines requirements for BYOD usage and establishes the steps that both users and the IT department should follow to initialize, support, and remove devices from company access. These requirements must be followed as documented to protect company systems and data from unauthorized access or misuse. From the ...

    View This Now
  • Hardware inventory policy

    Tools & Templates // Mar 2017 // provided by Tech Pro Research

    This policy describes guidelines your organization can follow to track, process, and decommission IT equipment. From the policy: Summary The organization’s IT hardware inventory constitutes a significant capital investment, and holding organization data, requires the organization to track each component from purchase and deployment to decommissioning and ...

    View This Now
  • Portable storage policy

    Tools & Templates // Mar 2017 // provided by Tech Pro Research

    This policy provides guidelines for the regulated and secure usage of portable storage devices. Its goal is to protect the organization and its employees from internal and external threats and to provide mechanisms for maintaining and monitoring data access in these scenarios. From the policy: Summary Portable ...

    View This Now