IT Policies

  • Data center access policy

    Downloads · Oct 2019 · Provided By TechRepublic Premium

    A company’s data center serves as the veritable lifeblood of the organization containing data, systems which run critical services, firewalls which permit access into and out of the company’s networks, and other elements which the business needs to function properly. With this in mind, it’s important to ensure that...

    Download Now
  • Business continuity policy

    Tools & Templates · Sep 2019 · Provided By TechRepublic Premium

    It’s an unfortunate fact of life in today’s world that both natural and manmade disasters can place businesses at risks both moderate and severe. Whether caused by earthquakes, hurricanes, blizzards, terrorist attacks, sabotage or some other element, business can be impeded from normal operations or shut down entirely if catastrophic...

    View This Now
  • Development lifecycle policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Software development is a complex process which involves a specific series of steps (known as the development lifecycle) to transform a concept into a deliverable product. The steps involved with creating the finished product must be adhered to carefully in order to yield the best results, reduce inefficiencies and maximize...

    Download Now
  • Third party vendor policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    In today’s era many businesses rely on outside companies, known as third party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. In these instances, it’s likely that third party vendors might collect, store or refer to confidential or...

    Download Now
  • Asset control policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary cost to the business. The purpose of this policy is...

    Download Now
  • Moonlighting policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of...

    Download Now
  • Perimeter security policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and vulnerabilities. While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get...

    Download Now
  • Patch management policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    Patching of operating systems, applications and devices is not usually ranked as a favorite endeavor of IT professionals, but it’s a critical pro-cess to ensure secure company operations as well as to reduce downtime and technical support headaches. A comprehensive patching strategy is a must in order to reap the...

    Download Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now
  • Scheduled downtime policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    Maintenance tasks and equipment upgrades and installations must be completed regularly—potentially creating disruptions and preventing employees from doing their work. This policy is designed to help your organization determine procedures for scheduling and communicating server, system, and network downtime with the goal of minimizing the impact and inconvenience for your...

    View This Now