IT Policies

  • Third party vendor policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    In today’s era many businesses rely on outside companies, known as third party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. In these instances, it’s likely that third party vendors might collect, store or refer to confidential or...

    Download Now
  • Employee political activity policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political affiliation. From the policy: Introduction No matter where in the world an enterprise operates, politics is going...

    Download Now
  • Asset control policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary cost to the business. The purpose of this policy is...

    Download Now
  • Moonlighting policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of...

    Download Now
  • Perimeter security policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and vulnerabilities. While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get...

    Download Now
  • Patch management policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    Patching of operating systems, applications and devices is not usually ranked as a favorite endeavor of IT professionals, but it’s a critical pro-cess to ensure secure company operations as well as to reduce downtime and technical support headaches. A comprehensive patching strategy is a must in order to reap the...

    Download Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now
  • Scheduled downtime policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    Maintenance tasks and equipment upgrades and installations must be completed regularly—potentially creating disruptions and preventing employees from doing their work. This policy is designed to help your organization determine procedures for scheduling and communicating server, system, and network downtime with the goal of minimizing the impact and inconvenience for your...

    View This Now
  • Internet and email usage policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    Internet and email communications are essential for performing modern business tasks, but companies must put rules in place to reduce the risks that come along with those technologies. This policy offers guidelines to help ensure that both IT and users follow safe practices when using electronic communications such as messaging...

    View This Now
  • Hardware decommissioning policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    When decommissioning hardware, standard and well-documented practices are critical. The steps outlined in this policy will guide your staff methodically through the process. Assets won’t be unnecessarily wasted or placed in the wrong hands, data stored on this hardware will be preserved as needed (or securely purged), and all ancillary...

    View This Now