IT Policies

  • Remote access policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. From the policy: Secure remote access to company systems...

    Download Now
  • Password management policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    Download Now
  • Security Awareness and Training policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: Summary A security policy is only as valuable as the knowledge and efforts of those who adhere to...

    Download Now
  • Information security policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An...

    Download Now
  • Email/Instant Message/Voicemail Retention policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Maintaining electronic communications in business involves walking a fine line. Employees want relevant information to be kept available for future reference so that they can do their jobs, but keeping these items long-term can pose security and resource risks. Server hard drives can fill up, or stolen data (even if...

    Download Now
  • Safeguarding customer information policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Data breaches can cost companies tens of thousands of dollars or more and can pose a significant risk to company operations and reputation. Customer information is usually one of the favorite targets of hackers as it entails confidential details which can be used to commit property or identity theft. Even...

    Download Now
  • How to work from home: IT pro’s guidebook to telecommuting and remote work

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Work from home policies and fully remote jobs top the priority list of many workers. After all, who doesn’t love the idea of working in their pajamas? Working from home also offers fewer distractions and interruptions from colleagues, reduces the stress of commuting, and provides a better work-life balance, not...

    View This Now
  • Telecommuting policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    As more and more employees request the opportunity to perform some or all of their work from a remote location, the need has grown for organizations to have clearly defined guidelines that govern employee and company expectations and responsibilities. This policy describes the organization's processes for requesting, obtaining, using,...

    Download Now
  • Internet Resource Access Policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Company devices which are hooked to the internet can involve both internal and external connections. These internet resources can be web servers, email servers, proxy servers, routers, FTP servers or any other public-facing device which performs a service or function. Because these resources are both generally critical for company operations...

    Download Now
  • Risk Management Policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impact. It’s not an easy process,...

    Download Now