Templates & Policies - Templates & Policies
Topics
-
CIO412
-
Infrastructure & Operations367
-
Enterprise Architecture154
-
Applications251
-
Project & Portfolio Management146
-
Data & Business Intelligence132
-
Security214
-
Vendor Management78
-
Templates & Policies114
-
-
Application Development11
-
Budgeting/Procurement10
-
Collaboration1
-
Communications3
-
Data & Digital Assets12
-
Department Governance24
-
Desktop Systems4
-
Disaster & Continuity10
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications10
-
Hardware13
-
HR Management9
-
Mobile & Wireless7
-
Network Management4
-
Operating Systems1
-
Operations11
-
Project Management16
-
Security19
-
Small Business Essentials9
-
Small Business Extras2
-
Storage5
-
Web Site Development4
-
Types of Content
Software Request FormThe software request form outlines the approval process for requesting the installation of software on end-user devices. |
|
Software Acquisition and Usage PolicyUse Info-Tech's sample policy to launch software acquisition management efforts to the top of your priority list. |
|
Software Development PolicyThe software development policy outlines the standard for corporate software development and code management. |
|
Anti-Harassment PolicyThe anti-harassment policy outlines the standards for preventing and dealing with harassment cases in the workplace. |
|
Telephone and Voicemail Acceptable Use PolicyTelephone and voicemail services are crucial and versatile communication tools for any business. However, they also run the risk of being repurposed for personal calls due... |
|
Limited Personal Use of Network Resources PolicyThe limited personal use of network resources policy outlines the standards for appropriate usage of corporate network resources. |
|
PDA Usage PolicyThe PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized as... |
|
Email Acceptable Use PolicyThe email acceptable use policy outlines the standards for appropriate use of corporate email accounts. |
|
Instant Messaging Usage and Security PolicyThe instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging. |
|
Audit Log Review PolicyThe audit log review policy will outline the standards across company systems for the review of audit logs. |
|