Templates & Policies - Templates & Policies
Topics
-
CIO405
-
Infrastructure & Operations365
-
Enterprise Architecture175
-
Applications252
-
Project & Portfolio Management158
-
Data & Business Intelligence151
-
Security193
-
Vendor Management76
-
Templates & Policies114
-
-
Application Development11
-
Budgeting/Procurement10
-
Collaboration1
-
Communications3
-
Data & Digital Assets12
-
Department Governance24
-
Desktop Systems4
-
Disaster & Continuity10
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications10
-
Hardware13
-
HR Management9
-
Mobile & Wireless7
-
Network Management4
-
Operating Systems1
-
Operations11
-
Project Management16
-
Security19
-
Small Business Essentials9
-
Small Business Extras2
-
Storage5
-
Web Site Development4
-
Types of Content
Software Request FormThe software request form outlines the approval process for requesting the installation of software on end-user devices. |
|
Software Acquisition and Usage PolicyUse Info-Tech's sample policy to launch software acquisition management efforts to the top of your priority list. |
|
Software Development PolicyThe software development policy outlines the standard for corporate software development and code management. |
|
Anti-Harassment PolicyThe anti-harassment policy outlines the standards for preventing and dealing with harassment cases in the workplace. |
|
Telephone and Voicemail Acceptable Use PolicyTelephone and voicemail services are crucial and versatile communication tools for any business. However, they also run the risk of being repurposed for personal calls... |
|
Limited Personal Use of Network Resources PolicyThe limited personal use of network resources policy outlines the standards for appropriate usage of corporate network resources. |
|
PDA Usage PolicyThe PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized... |
|
Email Acceptable Use PolicyThe email acceptable use policy outlines the standards for appropriate use of corporate email accounts. |
|
Instant Messaging Usage and Security PolicyThe instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging. |
|
Audit Log Review PolicyThe audit log review policy will outline the standards across company systems for the review of audit logs. |
|