All Research

Data Access Policy

The data access policy will outline the responsibilities for the protection of institutional data and prevent unauthorized, wrongful, or malicious use.

Data Management Policy

The data management policy will outline the standards for uniform management of all corporate critical data.

Data Cleansing and Quality Policy

The data cleansing and quality policy will outline the responsibilities for ensuring that all corporate data adheres to the principles of data quality and that redundant...

Data Integration and Virtualization Policy

The data integration and virtualization policy will outline the responsibilities for mitigating the risks to personal privacy when integrating, replicating, or...

Change Control – Freezes & Risk Evaluation Policy

The purpose of this policy is to ensure that IT staff recognize that changes to computer systems tend to destabilize those systems.

Document Retention Policy

The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...

Server Backup Policy

The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...

On-Call Policy

The on-call policy’s purpose is to establish a policy and procedures relating to expectations and compensation for employees required to be placed on on-call status...

Downtime Policy

This downtime policy helps create a baseline for what is considered acceptable or planned downtime of system and applications.

Stakeholder Power Map Template

Identify and prioritize the stakeholders that are important to your IT strategy development effort.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us