IT Policies

  • Intrusion detection policy

    Tools & Templates · Sep 2020 · Provided By TechRepublic Premium

    All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state of the world’s current security environment and for the most part enterprises, especially well-managed ones, have come to terms with this...

    View This Now
  • Streaming media policy

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    Although there are many legitimate business reasons to access streamed audio and video files—such as engaging in training, reviewing industry-related content, and conducting research—there are also opportunities for misuse. This policy provides guidelines for the appropriate use of streaming media on systems and devices that access company networks. From...

    View This Now
  • The Workers' Experience : Education

    White Papers · Aug 2020 · Provided By Dell Technologies

    In the Education industry, results matter. Quality education is vital for developing critical skills and achieving life goals. To that end, educators strive for the richest learning experiences through innovative teaching methods supported by advanced technology. At the same time, Education is constrained by budgets that are often taxpayer-funded and...

    Download Now
  • ESG: Embracing Data Virtualization with Microsoft SQL Server and Dell Technologies

    White Papers · Aug 2020 · Provided By Dell Technologies

    Organizations across industries continue down the digital transformation path. ESG research shows that while 19% of organizations view themselves as having already implemented and optimized several digital transformation initiatives, a majority (57%) of organizations are still on the path, with 18% still in the planning stages. While hiring staff is...

    Download Now
  • Managing accounts payable operations during COVID-19 policy

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    The Managing Accounts Payable Operations During COVID-19 policy describes the procedures the organization and its representatives must use when paying any approved invoice from any authorized vendor, supplier, consultant, contractor, government agency, or other authorized product, services or tax authority. The policy applies during the COVID-19 pandemic beginning March 2020...

    View This Now
  • Hardware inventory policy

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    This policy describes guidelines your organization can follow to track, process, and decommission IT equipment. From the policy: Summary The organization’s IT hardware inventory constitutes a significant capital investment, and holding organization data, requires the organization to track each component from purchase and deployment to decommissioning and...

    View This Now
  • Cloud Data Storage Policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    Third-party cloud-based file storage applications such as Dropbox, OneDrive, Box, and Google Drive have all contributed to the success of business cloud data storage. These products have brought proven flexibility and ease of data access to users and businesses alike while ensuring security of confidential information. Cloud data storage offers...

    View This Now
  • Identity theft protection policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for, and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since...

    View This Now
  • Shadow IT policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    Shadow IT is a concept whereby an organization’s employees use technology, services, or systems without knowledge of or approval from the IT department. Simply put, many users opt to make an end run around what they perceive as a stodgy or restrictive IT department to get their needs met in...

    View This Now
  • Incident response policy

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    Every enterprise needs to establish a plan of action to assess and then recover from unauthorized access to its network. This policy provides a foundation from which to start building your specific procedures. From the policy: Policy details Whether initiated with criminal intent or not, unauthorized access...

    View This Now