IT Policies

  • Data center access policy

    Downloads · Oct 2019 · Provided By TechRepublic Premium

    A company’s data center serves as the veritable lifeblood of the organization containing data, systems which run critical services, firewalls which permit access into and out of the company’s networks, and other elements which the business needs to function properly. With this in mind, it’s important to ensure that...

    Download Now
  • Solving Edge Computing Infrastructure Challenges

    White Papers · Sep 2019 · Provided By Schneider Electric

    Edge compute (distributed IT) installations have become increasingly business critical. Deploying and operating IT at the edge of the network, however, comes with unique challenges. Solving them requires a departure from the traditional means of selecting, configuring, assembling, operating, and maintaining these systems. This paper describes a new, emerging model...

    Download Now
  • Business continuity policy

    Tools & Templates · Sep 2019 · Provided By TechRepublic Premium

    It’s an unfortunate fact of life in today’s world that both natural and manmade disasters can place businesses at risks both moderate and severe. Whether caused by earthquakes, hurricanes, blizzards, terrorist attacks, sabotage or some other element, business can be impeded from normal operations or shut down entirely if catastrophic...

    View This Now
  • Virtualization policy

    Tools & Templates · Sep 2019 · Provided By TechRepublic Premium

    Virtualization platforms are available from a number of vendors, but it’s still critical to maintain your virtualization environment to avoid unnecessary resource consumption, out of-compliance systems or applications, data loss, security breaches, and other negative outcomes. This policy defines responsibilities for both end users and the IT department to ensure...

    View This Now
  • Development lifecycle policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Software development is a complex process which involves a specific series of steps (known as the development lifecycle) to transform a concept into a deliverable product. The steps involved with creating the finished product must be adhered to carefully in order to yield the best results, reduce inefficiencies and maximize...

    Download Now
  • Third party vendor policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    In today’s era many businesses rely on outside companies, known as third party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. In these instances, it’s likely that third party vendors might collect, store or refer to confidential or...

    Download Now
  • Employee political activity policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political affiliation. From the policy: Introduction No matter where in the world an enterprise operates, politics is going...

    Download Now
  • Live Webcast - Software Asset Management 2.0: Optimizing IT Spend in a Digital World

    Webcasts · Aug 2019 · Provided By KPMG & Flexera

    Digital solutions are the oxygen which allows a business run at market speed. Driven by digitization, 44 percent of organizations expect to change their product/service offering or business model in a fundamental way in the next three years.1 At the same time, companies are being asked to reduce...

    Watch Now
  • Webcast - Software Asset Management 2.0: Optimizing IT Spend in a Digital World

    Webcasts · Aug 2019 · Provided By KPMG & Flexera

    Digital solutions are the oxygen which allows a business run at market speed. Driven by digitization, 44 percent of organizations expect to change their product/service offering or business model in a fundamental way in the next three years.1 At the same time, companies are being asked to reduce...

    Watch Now
  • Asset control policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary cost to the business. The purpose of this policy is...

    Download Now