IT Policies

  • Telecommuting policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    As more and more employees request the opportunity to perform some or all of their work from a remote location, the need has grown for organizations to have clearly defined guidelines that govern employee and company expectations and responsibilities. This policy describes the organization's processes for requesting, obtaining, using,...

    Download Now
  • Risk Management Policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impact. It’s not an easy process,...

    Download Now
  • Whistleblower policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    A whistleblower is defined as a person who spots or is made aware of unauthorized or illegal activity taking place within an organization and elects to report it to the appropriate individuals. Facilitating whistleblowers and protecting them from repercussions is essential to ensure companies and employed personnel behave with ethics...

    Download Now
  • Disaster recovery and business continuity plan

    Tools & Templates · Feb 2020 · Provided By TechRepublic Premium

    Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing business processes in a crisis. This download explains what needs to go into your DR/BC plan to help your organization prepare for—and recover from—a potential disaster....

    View This Now
  • Employee political activity policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political affiliation. From the policy: Introduction No matter where in the world an enterprise operates, politics is going...

    Download Now
  • Document retention policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Establishing proper timeframes for the storage of sensitive or private documents is essential to efficient company guidelines. Keeping documents for too short a period of time may negatively impact business operations or customer interactions. On the other hand, retaining documents for too long a period may violate rules or legal...

    Download Now
  • IT physical security policy

    Tools & Templates · Feb 2020 · Provided By TechRepublic Premium

    This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: Physical security guidelines and requirements The following guidelines should be followed in designing...

    View This Now
  • Access management policy

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company....

    Download Now
  • Storage area networking (SANs) policy

    Downloads · Dec 2019 · Provided By TechRepublic Premium

    Storage Area Networks (SANs) provide manageable, centralized storage capacity for systems offering vast amounts of disk space via a dedicated network link. SANs can offer servers much more disk space than they might be able to utilize locally, often spanning dozens if not hundreds of terabytes of data. Because of...

    Download Now
  • Forrester: Managing Security Risk & Compliance

    White Papers · Oct 2019 · Provided By Dell Technologies

    The explosion of data and proliferation of devices demands better security tools and monitoring from businesses. Protecting sensitive company data shouldn’t just be a compliance obligation, it should be a business imperative.For this reason, the right technology partners will help push security, risk, and compliance objectives forward. This Forrester Consulting...

    Download Now