IT Policies

  • Perimeter security policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and vulnerabilities. While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get...

    Download Now
  • Patch management policy

    White Papers · Aug 2019 · Provided By TechRepublic Premium

    Patching of operating systems, applications and devices is not usually ranked as a favorite endeavor of IT professionals, but it’s a critical pro-cess to ensure secure company operations as well as to reduce downtime and technical support headaches. A comprehensive patching strategy is a must in order to reap the...

    Download Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now
  • Scheduled downtime policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    Maintenance tasks and equipment upgrades and installations must be completed regularly—potentially creating disruptions and preventing employees from doing their work. This policy is designed to help your organization determine procedures for scheduling and communicating server, system, and network downtime with the goal of minimizing the impact and inconvenience for your...

    View This Now
  • Hardware decommissioning policy

    Tools & Templates · May 2019 · Provided By TechRepublic Premium

    When decommissioning hardware, standard and well-documented practices are critical. The steps outlined in this policy will guide your staff methodically through the process. Assets won’t be unnecessarily wasted or placed in the wrong hands, data stored on this hardware will be preserved as needed (or securely purged), and all ancillary...

    View This Now
  • Resource and data recovery policy

    Tools & Templates · Jan 2019 · Provided By TechRepublic Premium

    Employees, data, and resources are three of the biggest assets in any organization. All employees should be familiar with the processes for recovering information if it becomes lost, inaccessible, or compromised. This policy provides guidelines for the recovery of data from company-owned or company-purchased resources, equipment, and/or services. From...

    View this now
  • Severe weather and emergency policy

    Tools & Templates · Jan 2019 · Provided By TechRepublic Premium

    This policy offers guidelines for responding to severe weather events and other emergencies. It covers the ramifications of closing the company, what steps to follow if the company is open but staff can’t get to work, how to notify staff of current developments, and how to pay personnel during these...

    View this now
  • Virtualization policy

    Tools & Templates · Dec 2018 · Provided By TechRepublic Premium

    Virtualization platforms are available from a number of vendors, but it’s still critical to maintain your virtualization environment to avoid unnecessary resource consumption, out of-compliance systems or applications, data loss, security breaches, and other negative outcomes. This policy defines responsibilities for both end users and the IT department to ensure...

    View This Now
  • Machine automation policy guidelines

    Tools & Templates · Sep 2018 · Provided By TechRepublic Premium

    Many industries rely on machine automation to save money and reduce risk. However, along with the benefits comes the critical need to implement policies for its proper use. This set of guidelines will help your organization keep its machine automation safe, reliable, and in compliance. From the guidelines: ...

    View this now
  • IT training policy

    Tools & Templates · Jul 2018 · Provided By TechRepublic Premium

    Successful IT departments are defined not only by the technology they deploy and manage, but by the skills and capabilities of their people. IT workers must stay up to date with the latest technology trends and evolutions, as well as soft skills, like project management, presentation and persuasion, and general...

    View this now