TechRepublic Premium

Displaying 91 - 100 of 166 results

  • How to work from home: IT pro’s guidebook to telecommuting and remote work

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Work from home policies and fully remote jobs top the priority list of many workers. After all, who doesn’t love the idea of working in their pajamas? Working from home also offers fewer distractions and interruptions from colleagues, reduces the stress of commuting, and provides a better work-life balance, not...

    View This Now
  • Telecommuting policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    As more and more employees request the opportunity to perform some or all of their work from a remote location, the need has grown for organizations to have clearly defined guidelines that govern employee and company expectations and responsibilities. This policy describes the organization's processes for requesting, obtaining, using,...

    Download Now
  • Internet Resource Access Policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Company devices which are hooked to the internet can involve both internal and external connections. These internet resources can be web servers, email servers, proxy servers, routers, FTP servers or any other public-facing device which performs a service or function. Because these resources are both generally critical for company operations...

    Download Now
  • Hiring Kit: MIS Manager

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    MIS Managers must have a knowledge of the technology, deep understanding of the importance of reliable data, and the skillset to make sure everything runs smoothly and as expected. This Hiring Kit from TechRepublic Premium provides a workable framework you can use to find, recruit, and ultimately hire the best...

    Download Now
  • Quick glossary: Cybersecurity attack response and mitigation

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you better be prepared. This quick glossary from TechRepublic Premium explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack. Familiarity with...

    Download Now
  • Risk Management Policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impact. It’s not an easy process,...

    Download Now
  • Whistleblower policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    A whistleblower is defined as a person who spots or is made aware of unauthorized or illegal activity taking place within an organization and elects to report it to the appropriate individuals. Facilitating whistleblowers and protecting them from repercussions is essential to ensure companies and employed personnel behave with ethics...

    Download Now
  • Employee political activity policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political affiliation. From the policy: Introduction No matter where in the world an enterprise operates, politics is going...

    Download Now
  • Hiring Kit: .Net developer

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Are you seeking to integrate the various parts of your internal online functions or your external online presence? You could probably use a .Net developer to help lead the way. The .Net developer has a thorough understanding of Microsoft’s .Net Framework, which consists of a number of different essentials for...

    Download Now
  • Document retention policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Establishing proper timeframes for the storage of sensitive or private documents is essential to efficient company guidelines. Keeping documents for too short a period of time may negatively impact business operations or customer interactions. On the other hand, retaining documents for too long a period may violate rules or legal...

    Download Now