IT Policies

  • End user data backup policy

    Tools & Templates · Jun 2018 · Provided By TechRepublic Premium

    Data without an associated backup is only as reliable as the system upon which it is stored—and every system has a finite lifespan or may be susceptible to malware or hacking efforts. This policy offers guidelines for implementing manageable and reliable backups for user data. From the policy: ...

    View this now
  • Software licensing policy

    Tools & Templates · Jun 2018 · Provided By TechRepublic Premium

    Organizations spend a fortune on software licenses every year, and a lack of management around it can result in heavy fines. This policy will help you establish guidelines to make sure you're in compliance and that any audits will be painless. From the policy: Staying in compliance with...

    View this now
  • Cloud computing policy

    Tools & Templates · May 2018 · Provided By TechRepublic Premium

    This policy provides guidelines for secure and effective cloud computing operations to ensure the integrity and privacy of company-owned information. From the policy: The list of advantages to cloud computing includes lowered operational costs, greater technological flexibility, and the ability to rapidly implement new systems or services. Gains in business...

    View this now
  • Internet of Things policy

    Downloads · May 2018 · Provided By TechRepublic Premium

    These guidelines cover the procurement, usage, and administration of IoT devices, whether provided by the company or employee owned. From the policy: Summary The Internet of Things (or IoT) refers to network- or internet-connected devices, such as appliances, thermostats, monitors, sensors, and portable items that can measure,...

    Download Now
  • Disaster recovery and business continuity plan

    Tools & Templates · Apr 2018 · Provided By TechRepublic Premium

    Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing business processes in a crisis. This download explains what needs to go into your DR/BC plan to help your organization prepare for—and recover from—a potential disaster....

    View this now
  • Software automation policy guidelines

    Tools & Templates · Apr 2018 · Provided By TechRepublic Premium

    Software automation is used for many business and IT processes, depending on industry vertical and individual company business and IT needs. Because this automation is far-reaching, policy considerations touch on many areas. This set of guidelines will help you cover all the bases as you build a comprehensive software automation...

    View this now
  • Password management policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    View this now
  • Information security policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An...

    View this now
  • IT physical security policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: Physical security guidelines and requirements The following guidelines should be followed in designing...

    View This Now
  • Auditing and logging policy

    Tools & Templates · Feb 2018 · Provided By TechRepublic Premium

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks, and devices that store or transport critical data. From the policy: Summary Many computer systems, network devices, and other technological hardware...

    View this now