• Computer Equipment Disposal policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    Computers, laptops, servers, and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer, some equipment is recycled, and other systems are given to employees or donated. Systems must be properly processed, and sensitive, proprietary, and all other organization information must be properly removed...

    Download Now
  • Internet and Email Usage policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    Internet and email communications are essential for performing modern business tasks, but companies must put rules in place to reduce the risks that come along with those technologies. This policy offers guidelines to help ensure that both IT and users follow safe practices when using electronic communications such as messaging...

    Download Now
  • Diversity and Inclusion policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    The importance of diversity and inclusion in any given organization cannot be overstated. It establishes a level playing field, brings together people with different backgrounds, perspectives, traditions, and ideas, and enriches company culture by ensuring fairness and tolerance. This helps build a more effective and collaborative workforce which enables the...

    Download Now
  • Zoom 101: A guidebook for beginners and business pros

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    Video conferencing has become more important than ever, particularly during the coronavirus pandemic. Zoom, a popular social platform, has experienced a surge of new users ranging from remote workers to schools. The tool combines video conferencing, online meetings, chat, and mobile collaboration, enabling users to meet locally, nationally, and globally...

    View This Now
  • Hiring Kit: Market Research Analyst

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    The insight to identify and quantify competitive advantages requires a skilled technician that can transform seemingly random data into actional information. Finding and hiring individuals with the right level of technical expertise, the inherent ability to identify patterns and trends, and with the corresponding communication skills to relay actionable information...

    Download Now
  • Remote access policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. From the policy: Secure remote access to company systems...

    Download Now
  • Network security policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: Summary Every company’s network is made up of devices that transmit and store...

    Download Now
  • Password management policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    Download Now
  • Security Awareness and Training policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: Summary A security policy is only as valuable as the knowledge and efforts of those who adhere to...

    Download Now
  • Email/Instant Message/Voicemail Retention policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Maintaining electronic communications in business involves walking a fine line. Employees want relevant information to be kept available for future reference so that they can do their jobs, but keeping these items long-term can pose security and resource risks. Server hard drives can fill up, or stolen data (even if...

    Download Now