White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Corporate gaming policy

    Tools & Templates // Aug 2017 // provided by Tech Pro Research

    Video games can benefit companies by giving employees a recreational outlet to build cooperation and morale. But they can also create problems if misused. This policy will help you establish the ground rules for permitting or prohibiting the use of company systems and networks for video gaming purposes. From ...

    View This Now
  • Configuration management policy

    Tools & Templates // Aug 2017 // provided by Tech Pro Research

    Implementing a configuration management strategy can involve a lot of work up front, but it will pay off in the long run by making day-to-day administrative life easier. This policy provides guidelines for applying effective, secure, and reliable configuration management techniques, whether in test, development, or production environments. Configuration ...

    View This Now
  • Home usage of company-owned equipment policy

    Tools & Templates // Jul 2017 // provided by Tech Pro Research

    Employees who work from home often use company-supplied systems and devices, which helps ensure that they have consistent, state-of-the-art equipment to do their work. However, organizations should provide usage guidelines, such as this policy, covering the responsibilities of IT staff and employees. From the policy: For an ...

    View This Now
  • Hardware decommissioning policy

    Tools & Templates // Jul 2017 // provided by Tech Pro Research

    When decommissioning hardware, standard and well-documented practices are critical. The steps outlined in this policy will guide your staff methodically through the process. Assets won’t be unnecessarily wasted or placed in the wrong hands, data stored on this hardware will be preserved as needed (or securely purged), and all ancillary ...

    View This Now
  • DHCP usage policy

    Tools & Templates // Jul 2017 // provided by Tech Pro Research

    DHCP makes life easier for IT staff and employees, allowing computer systems and devices to quickly be connected to a network and given necessary access. The alternative of using permanent (or static) IP addresses is time consuming, but static IP addresses can be more secure. So despite the advantages of ...

    View This Now
  • Securing Windows policy

    Tools & Templates // Jun 2017 // provided by Tech Pro Research

    Windows is not without certain issues and flaws. Like any operating system it has been exposed to numerous vulnerabilities, both deliberate (viruses) and unintentional (exploitable holes in programs or processes)—so it’s essential that your company has a policy in place to help protect and secure your Windows machines. This ...

    View This Now
  • Shadow IT policy

    Tools & Templates // Jun 2017 // provided by Tech Pro Research

    This policy provides guidelines for the appropriate use of shadow IT, explains the restrictions that will apply to it, and defines elements pertaining to employee and IT department responsibilities. From the policy: Allowable scenarios Shadow IT is permitted but only for non mission-critical applications, services, or ...

    View This Now
  • Network security policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: Summary Every company’s network is made up of devices that transmit and store ...

    View This Now
  • Information security incident reporting policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    Make sure your employees know how to spot potential security breaches and how they should respond. This policy describes the signs that might point to a security incident and offers guidelines on the steps they should take. From the policy: Summary Confidential information must be kept secure to ...

    View This Now
  • Employee termination policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    Whether due to resignation, layoff, or firing, separating employees from the business is never a pleasant process. Even so, it’s critical to follow a systematic procedure to ensure that all necessary measures are taken. This policy provides guidelines for disabling former employee access, reclaiming company equipment, and finalizing payroll/benefits details. ...

    View This Now