IT Policies

  • Moonlighting policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of...

    Download Now
  • Perimeter security policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and vulnerabilities. While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get...

    Download Now
  • Patch management policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    Patching of operating systems, applications and devices is not usually ranked as a favorite endeavor of IT professionals, but it’s a critical pro-cess to ensure secure company operations as well as to reduce downtime and technical support headaches. A comprehensive patching strategy is a must in order to reap the...

    Download Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now
  • Scheduled downtime policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    Maintenance tasks and equipment upgrades and installations must be completed regularly—potentially creating disruptions and preventing employees from doing their work. This policy is designed to help your organization determine procedures for scheduling and communicating server, system, and network downtime with the goal of minimizing the impact and inconvenience for your...

    View This Now
  • Internet and email usage policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    Internet and email communications are essential for performing modern business tasks, but companies must put rules in place to reduce the risks that come along with those technologies. This policy offers guidelines to help ensure that both IT and users follow safe practices when using electronic communications such as messaging...

    View This Now
  • Hardware decommissioning policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    When decommissioning hardware, standard and well-documented practices are critical. The steps outlined in this policy will guide your staff methodically through the process. Assets won’t be unnecessarily wasted or placed in the wrong hands, data stored on this hardware will be preserved as needed (or securely purged), and all ancillary...

    View This Now
  • Employee objectives policy

    Tools & Templates · Apr 2019 · Provided By TechRepublic Premium

    One of the key responsibilities of managing employees is helping them develop their careers. And one of the best ways to do that is by establishing clear, measurable objectives toward achieving their goals. This policy offers a simple outline of what qualifies as an acceptable objective and how managers and...

    View This Now
  • VPN usage policy

    Tools & Templates · Apr 2019 · Provided By TechRepublic Premium

    As more and more users work from remote locations, the need for secure access to networks, systems, and data continues to grow. This policy provides guidelines to help IT ensure that VPNs are properly deployed and outlines acceptable use policies for end users on company-issued and personal devices. From...

    View This Now
  • Remote access policy

    Tools & Templates · Mar 2019 · Provided By TechRepublic Premium

    This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. The download includes a PDF version, along with a...

    View this now