IT Policies

  • Encryption policy

    Tools & Templates · Jan 2018 · Provided By TechRepublic Premium

    Encryption offers a means of protecting data in transit or stored on devices--but organizations must follow proven methods and adhere to current standards for it to be effective. This policy outlines tested and recommended encryption technologies to help secure your corporate data. From the policy: Ciphers that are...

    View this now
  • System update policy

    Tools & Templates · Dec 2017 · Provided By TechRepublic Premium

    To ensure security and stability, it’s critical to have standardized, well-documented practices for installing software updates. This policy offers guidelines for managing the update process, logging changes, and handling backups and device decommissioning. From the policy: Maintaining a regular schedule of updates—as well as applying critical out-of-band patches as...

    View this now
  • Intrusion detection policy

    Tools & Templates · Dec 2017 · Provided By TechRepublic Premium

    A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This sample policy establishes guidelines and procedures your organization can follow when your computer network is compromised. From the policy: Policy details An enterprise with a clear...

    View this now
  • Shadow IT policy

    Tools & Templates · Nov 2017 · Provided By TechRepublic Premium

    This policy provides guidelines for the appropriate use of shadow IT, explains the restrictions that will apply to it, and defines elements pertaining to employee and IT department responsibilities. From the policy: Allowable scenarios Shadow IT is permitted but only for non mission-critical applications, services, or...

    View this now
  • New equipment budget policy

    Tools & Templates · Oct 2017 · Provided By TechRepublic Premium

    Investments in technological equipment and software can return high dividends in the form of employee productivity. But planning and tracking these expenses can be a challenge for IT departments, even with do-it-yourself strategies, such as BYOD. This policy (and the associated New Equipment Form) will help the IT department coordinate...

    View this now
  • Wireless networking policy

    Tools & Templates · Oct 2017 · Provided By TechRepublic Premium

    Wireless networks have given users enormous flexibility and lessened the burden of supporting their connectivity needs. But along with the benefits comes the critical need to make sure wireless networks are properly and securely configured. This policy establishes guidelines, prohibitions, and procedures for both IT and end users. From...

    View this now
  • Securing Linux policy

    Tools & Templates · Sep 2017 · Provided By TechRepublic Premium

    Linux has been the backbone of many businesses for decades. It has powered web servers, database systems, development machines, and employee workstations. And as with any OS, it’s essential to ensure that security standards are met in corporate environments. This policy offers guidelines for securing Linux on company computers and...

    View this now
  • Mobile device computing policy

    Tools & Templates · Aug 2017 · Provided By TechRepublic Premium

    Mobile devices offer convenience and flexibility for the modern workforce—but they also bring associated risks and support issues. This policy establishes guidelines to help ensure safe and productive use of mobile devices by employees, along with recommendations for IT pros responsible for administering and supporting those devices. From the...

    View this now
  • Corporate gaming policy

    Tools & Templates · Aug 2017 · Provided By TechRepublic Premium

    Video games can benefit companies by giving employees a recreational outlet to build cooperation and morale. But they can also create problems if misused. This policy will help you establish the ground rules for permitting or prohibiting the use of company systems and networks for video gaming purposes. From...

    View this now
  • Configuration management policy

    Tools & Templates · Aug 2017 · Provided By TechRepublic Premium

    Implementing a configuration management strategy can involve a lot of work up front, but it will pay off in the long run by making day-to-day administrative life easier. This policy provides guidelines for applying effective, secure, and reliable configuration management techniques, whether in test, development, or production environments. Configuration...

    View this now