The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
|
The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...
|
|
Telephone and voicemail services are crucial and versatile communication tools for any business. However, they also run the risk of being repurposed for personal calls...
|
|
The dress code policy outlines appropriate and inappropriate work attire.
|
|
The taxonomy quality assurance policy has been established in order to preserve the accuracy of categorized folders, files, and directory structures available on network...
|
|
The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...
|
|
The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.
|
|
The purpose of this policy is to ensure that IT staff recognize that changes to computer systems tend to destabilize those systems.
|
|
Identify and prioritize the stakeholders that are important to your IT strategy development effort.
|
|
Use the IT Integration Roadmap Tool to track key elements during the M&A discovery, integration planning, and execution phases.
|
|