IT Policies

  • End user data backup policy

    Tools & Templates · Sep 2020 · Provided By TechRepublic Premium

    Data without an associated backup is only as reliable as the system upon which it is stored—and every system has a finite lifespan or may be susceptible to malware or hacking efforts. This policy offers guidelines for implementing manageable and reliable backups for user data. From the policy: ...

    View This Now
  • Intrusion detection policy

    Tools & Templates · Sep 2020 · Provided By TechRepublic Premium

    All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state of the world’s current security environment and for the most part enterprises, especially well-managed ones, have come to terms with this...

    View This Now
  • Streaming media policy

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    Although there are many legitimate business reasons to access streamed audio and video files—such as engaging in training, reviewing industry-related content, and conducting research—there are also opportunities for misuse. This policy provides guidelines for the appropriate use of streaming media on systems and devices that access company networks. From...

    View This Now
  • Managing accounts payable operations during COVID-19 policy

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    The Managing Accounts Payable Operations During COVID-19 policy describes the procedures the organization and its representatives must use when paying any approved invoice from any authorized vendor, supplier, consultant, contractor, government agency, or other authorized product, services or tax authority. The policy applies during the COVID-19 pandemic beginning March 2020...

    View This Now
  • Hardware inventory policy

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    This policy describes guidelines your organization can follow to track, process, and decommission IT equipment. From the policy: Summary The organization’s IT hardware inventory constitutes a significant capital investment, and holding organization data, requires the organization to track each component from purchase and deployment to decommissioning and...

    View This Now
  • ACH payment process policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    The ACH payment process policy from TechRepublic Premium describes the procedures the organization and its representatives must use when paying any approved invoice from any authorized vendor, supplier, consultant, contractor, government agency, or other authorized product, services or tax authority via a manual electronic payment. PURPOSE Unauthorized parties continually work,...

    View This Now
  • Cloud Data Storage Policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    Third-party cloud-based file storage applications such as Dropbox, OneDrive, Box, and Google Drive have all contributed to the success of business cloud data storage. These products have brought proven flexibility and ease of data access to users and businesses alike while ensuring security of confidential information. Cloud data storage offers...

    View This Now
  • Identity theft protection policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for, and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since...

    View This Now
  • COVID-19 workplace policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    The COVID-19 workplace policy from TechRepublic Premium describes the procedures the organization has adopted in an attempt to minimize the spread of coronavirus infections. Purpose The purpose of the COVID-19 workplace policy is to ensure all individuals entering organization facilities understand and abide by COVID-19 protocols. The guidelines described within...

    View This Now
  • Shadow IT policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    Shadow IT is a concept whereby an organization’s employees use technology, services, or systems without knowledge of or approval from the IT department. Simply put, many users opt to make an end run around what they perceive as a stodgy or restrictive IT department to get their needs met in...

    View This Now