IT Policies

  • Disaster recovery and business continuity plan

    Tools & Templates · Apr 2018 · Provided By TechRepublic Premium

    Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing business processes in a crisis. This download explains what needs to go into your DR/BC plan to help your organization prepare for—and recover from—a potential disaster....

    View this now
  • Software automation policy guidelines

    Tools & Templates · Apr 2018 · Provided By TechRepublic Premium

    Software automation is used for many business and IT processes, depending on industry vertical and individual company business and IT needs. Because this automation is far-reaching, policy considerations touch on many areas. This set of guidelines will help you cover all the bases as you build a comprehensive software automation...

    View this now
  • Password management policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    View this now
  • Information security policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An...

    View this now
  • IT physical security policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: Physical security guidelines and requirements The following guidelines should be followed in designing...

    View This Now
  • Auditing and logging policy

    Tools & Templates · Feb 2018 · Provided By TechRepublic Premium

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks, and devices that store or transport critical data. From the policy: Summary Many computer systems, network devices, and other technological hardware...

    View this now
  • Encryption policy

    Tools & Templates · Jan 2018 · Provided By TechRepublic Premium

    Encryption offers a means of protecting data in transit or stored on devices--but organizations must follow proven methods and adhere to current standards for it to be effective. This policy outlines tested and recommended encryption technologies to help secure your corporate data. From the policy: Ciphers that are...

    View this now
  • System update policy

    Tools & Templates · Dec 2017 · Provided By TechRepublic Premium

    To ensure security and stability, it’s critical to have standardized, well-documented practices for installing software updates. This policy offers guidelines for managing the update process, logging changes, and handling backups and device decommissioning. From the policy: Maintaining a regular schedule of updates—as well as applying critical out-of-band patches as...

    View this now
  • Intrusion detection policy

    Tools & Templates · Dec 2017 · Provided By TechRepublic Premium

    A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This sample policy establishes guidelines and procedures your organization can follow when your computer network is compromised. From the policy: Policy details An enterprise with a clear...

    View this now
  • Shadow IT policy

    Tools & Templates · Nov 2017 · Provided By TechRepublic Premium

    This policy provides guidelines for the appropriate use of shadow IT, explains the restrictions that will apply to it, and defines elements pertaining to employee and IT department responsibilities. From the policy: Allowable scenarios Shadow IT is permitted but only for non mission-critical applications, services, or...

    View this now