IT Policies

  • Streaming media policy

    Tools & Templates · Jul 2018 · Provided By TechRepublic Premium

    Although there are many legitimate business reasons to access streamed audio and video files—such as engaging in training, reviewing industry-related content, and conducting research—there are also opportunities for misuse. This policy provides guidelines for the appropriate use of streaming media on systems and devices that access company networks. From...

    View this now
  • IT training policy

    Tools & Templates · Jul 2018 · Provided By TechRepublic Premium

    Successful IT departments are defined not only by the technology they deploy and manage, but by the skills and capabilities of their people. IT workers must stay up to date with the latest technology trends and evolutions, as well as soft skills, like project management, presentation and persuasion, and general...

    View this now
  • End user data backup policy

    Tools & Templates · Jun 2018 · Provided By TechRepublic Premium

    Data without an associated backup is only as reliable as the system upon which it is stored—and every system has a finite lifespan or may be susceptible to malware or hacking efforts. This policy offers guidelines for implementing manageable and reliable backups for user data. From the policy: ...

    View this now
  • Software licensing policy

    Tools & Templates · Jun 2018 · Provided By TechRepublic Premium

    Organizations spend a fortune on software licenses every year, and a lack of management around it can result in heavy fines. This policy will help you establish guidelines to make sure you're in compliance and that any audits will be painless. From the policy: Staying in compliance with...

    View this now
  • Cloud computing policy

    Tools & Templates · May 2018 · Provided By TechRepublic Premium

    This policy provides guidelines for secure and effective cloud computing operations to ensure the integrity and privacy of company-owned information. From the policy: The list of advantages to cloud computing includes lowered operational costs, greater technological flexibility, and the ability to rapidly implement new systems or services. Gains in business...

    View this now
  • Internet of Things policy

    Downloads · May 2018 · Provided By TechRepublic Premium

    These guidelines cover the procurement, usage, and administration of IoT devices, whether provided by the company or employee owned. From the policy: Summary The Internet of Things (or IoT) refers to network- or internet-connected devices, such as appliances, thermostats, monitors, sensors, and portable items that can measure,...

    Download Now
  • Disaster recovery and business continuity plan

    Tools & Templates · Apr 2018 · Provided By TechRepublic Premium

    Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing business processes in a crisis. This download explains what needs to go into your DR/BC plan to help your organization prepare for—and recover from—a potential disaster....

    View this now
  • Software automation policy guidelines

    Tools & Templates · Apr 2018 · Provided By TechRepublic Premium

    Software automation is used for many business and IT processes, depending on industry vertical and individual company business and IT needs. Because this automation is far-reaching, policy considerations touch on many areas. This set of guidelines will help you cover all the bases as you build a comprehensive software automation...

    View this now
  • Password management policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    View this now
  • Information security policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An...

    View this now