IT Policies

  • IT physical security policy

    Tools & Templates · Mar 2018 · Provided By TechRepublic Premium

    This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: Physical security guidelines and requirements The following guidelines should be followed in designing...

    View This Now
  • Auditing and logging policy

    Tools & Templates · Feb 2018 · Provided By TechRepublic Premium

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks, and devices that store or transport critical data. From the policy: Summary Many computer systems, network devices, and other technological hardware...

    View this now
  • Encryption policy

    Tools & Templates · Jan 2018 · Provided By TechRepublic Premium

    Encryption offers a means of protecting data in transit or stored on devices--but organizations must follow proven methods and adhere to current standards for it to be effective. This policy outlines tested and recommended encryption technologies to help secure your corporate data. From the policy: Ciphers that are...

    View this now
  • System update policy

    Tools & Templates · Dec 2017 · Provided By TechRepublic Premium

    To ensure security and stability, it’s critical to have standardized, well-documented practices for installing software updates. This policy offers guidelines for managing the update process, logging changes, and handling backups and device decommissioning. From the policy: Maintaining a regular schedule of updates—as well as applying critical out-of-band patches as...

    View this now
  • Intrusion detection policy

    Tools & Templates · Dec 2017 · Provided By TechRepublic Premium

    A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This sample policy establishes guidelines and procedures your organization can follow when your computer network is compromised. From the policy: Policy details An enterprise with a clear...

    View this now
  • Shadow IT policy

    Tools & Templates · Nov 2017 · Provided By TechRepublic Premium

    This policy provides guidelines for the appropriate use of shadow IT, explains the restrictions that will apply to it, and defines elements pertaining to employee and IT department responsibilities. From the policy: Allowable scenarios Shadow IT is permitted but only for non mission-critical applications, services, or...

    View this now
  • IDC Technology Spotlight: The Path to a Thinking Supply Chain

    White Papers · Oct 2017 · Provided By IBM

    Customers expect what they want, where and when they want it. Is your supply chain helping you exceed customer expectations? Read this IDC report detailing how supply chains are experiencing a period of significant change and how you can take advantage of it. Fill out the form today.

    Continue
  • New equipment budget policy

    Tools & Templates · Oct 2017 · Provided By TechRepublic Premium

    Investments in technological equipment and software can return high dividends in the form of employee productivity. But planning and tracking these expenses can be a challenge for IT departments, even with do-it-yourself strategies, such as BYOD. This policy (and the associated New Equipment Form) will help the IT department coordinate...

    View this now
  • Wireless networking policy

    Tools & Templates · Oct 2017 · Provided By TechRepublic Premium

    Wireless networks have given users enormous flexibility and lessened the burden of supporting their connectivity needs. But along with the benefits comes the critical need to make sure wireless networks are properly and securely configured. This policy establishes guidelines, prohibitions, and procedures for both IT and end users. From...

    View this now
  • Securing Linux policy

    Tools & Templates · Sep 2017 · Provided By TechRepublic Premium

    Linux has been the backbone of many businesses for decades. It has powered web servers, database systems, development machines, and employee workstations. And as with any OS, it’s essential to ensure that security standards are met in corporate environments. This policy offers guidelines for securing Linux on company computers and...

    View this now