IT Policies

  • Personnel screening policy

    Tools & Templates · Mar 2020 · Provided By TechRepublic Premium

    Personnel screening involves analyzing the background of company applicants to ensure that they are a creditable fit for the role in which they intend to work. The process may entail analysis of criminal records, credit history, employment/academic verifications, job skills, and other criteria. This policy provides a framework for building...

    View This Now
  • Email/Instant Message/Voicemail Retention policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Maintaining electronic communications in business involves walking a fine line. Employees want relevant information to be kept available for future reference so that they can do their jobs, but keeping these items long-term can pose security and resource risks. Server hard drives can fill up, or stolen data (even if...

    Download Now
  • Information security policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An...

    Download Now
  • Safeguarding customer information policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Data breaches can cost companies tens of thousands of dollars or more and can pose a significant risk to company operations and reputation. Customer information is usually one of the favorite targets of hackers as it entails confidential details which can be used to commit property or identity theft. Even...

    Download Now
  • How to work from home: IT pro’s guidebook to telecommuting and remote work

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Work from home policies and fully remote jobs top the priority list of many workers. After all, who doesn’t love the idea of working in their pajamas? Working from home also offers fewer distractions and interruptions from colleagues, reduces the stress of commuting, and provides a better work-life balance, not...

    View This Now
  • Telecommuting policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    As more and more employees request the opportunity to perform some or all of their work from a remote location, the need has grown for organizations to have clearly defined guidelines that govern employee and company expectations and responsibilities. This policy describes the organization's processes for requesting, obtaining, using,...

    Download Now
  • Internet Resource Access Policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Company devices which are hooked to the internet can involve both internal and external connections. These internet resources can be web servers, email servers, proxy servers, routers, FTP servers or any other public-facing device which performs a service or function. Because these resources are both generally critical for company operations...

    Download Now
  • Visualizing the 5 Zero Trust Focus Areas

    White Papers · Feb 2020 · Provided By AppGate

    IT Broke Traditional Security An expanded digital footprint, influx of connections, on-demand operating models and pervasive threats require a better approach to security. Zero Trust Security eliminates the idea of a trusted perimeter-based network. The model default denies access to systems until trust is extensively verified and strictly...

    Download Now
  • AppGate: Visualizing the 5 Zero Trust Focus Areas

    White Papers · Feb 2020 · Provided By AppGate

    IT Broke Traditional Security An expanded digital footprint, influx of connections, on-demand operating models and pervasive threats require a better approach to security. Zero Trust Security eliminates the idea of a trusted perimeter-based network. The model default denies access to systems until trust is extensively verified and strictly...

    Download Now
  • Risk Management Policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impact. It’s not an easy process,...

    Download Now