Tagged - Policies

Data Integration and Virtualization Policy

The data integration and virtualization policy will outline the responsibilities for mitigating the risks to personal privacy when integrating, replicating, or...

End-User Computing Strategy and Roadmap TCO Calculator

End-user computing options grow more and more complex. Estimate costs and keep on budget using a five-year TCO calculator.

End-User Computing Focus Group Survey

Gain a better grasp on what end users expect from end-user computing.

Low Risk Information Acceptable Use Policy

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different...

High Risk Information Acceptable Use Policy

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different...

Data Provenance Policy

The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through improper sourcing, misuse,...

Data Entry Policy

The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of the organization.

Data Steward

Data stewards are designated employees with a mandate and accountability for improving the data quality and integrity in their particular business area or data silo. They...

Chief Privacy Officer

The role of the Chief Privacy Officer is to provide vision and leadership for developing and supporting initiatives critical to the organization's information privacy...

Corporate Compliance Officer

The role of the Corporate Compliance Officer is to oversee and review all legal technology issues across the organization. This includes providing objective assessments...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us