IT Policies

  • Data center access policy

    Downloads · Oct 2019 · Provided By TechRepublic Premium

    A company’s data center serves as the veritable lifeblood of the organization containing data, systems which run critical services, firewalls which permit access into and out of the company’s networks, and other elements which the business needs to function properly. With this in mind, it’s important to ensure that...

    Download Now
  • Development lifecycle policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Software development is a complex process which involves a specific series of steps (known as the development lifecycle) to transform a concept into a deliverable product. The steps involved with creating the finished product must be adhered to carefully in order to yield the best results, reduce inefficiencies and maximize...

    Download Now
  • Third party vendor policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    In today’s era many businesses rely on outside companies, known as third party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. In these instances, it’s likely that third party vendors might collect, store or refer to confidential or...

    Download Now
  • Employee political activity policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political affiliation. From the policy: Introduction No matter where in the world an enterprise operates, politics is going...

    Download Now
  • Asset control policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary cost to the business. The purpose of this policy is...

    Download Now
  • Moonlighting policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of...

    Download Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now
  • Internet of Things policy

    Downloads · May 2018 · Provided By TechRepublic Premium

    These guidelines cover the procurement, usage, and administration of IoT devices, whether provided by the company or employee owned. From the policy: Summary The Internet of Things (or IoT) refers to network- or internet-connected devices, such as appliances, thermostats, monitors, sensors, and portable items that can measure,...

    Download Now
  • Employee Performance Review Policy

    Downloads · Jul 2014 · Provided By TechRepublic Premium

    It is critical for organizations to recognize personnel accomplishments, provide proper job direction and ensure that employee priorities are aligned with those of their departments as well as the business itself. Performance reviews achieve this by measuring and identifying employee strengths and successes as well as areas which need improvement....

    Download Now