Enterprise Information Management - Templates & Policies

Email Acceptable Use Policy

The email acceptable use policy outlines the standards for appropriate use of corporate email accounts.

Information Acceptable Use Policy

The information acceptable use policy outlines standards for appropriate use of corporate information and IT equipment.

Taxonomy Quality Assurance Policy

The taxonomy quality assurance policy has been established in order to preserve the accuracy of categorized folders, files, and directory structures available on network...

ESG Business Case and Operations Plan

The Email Security Gateway (ESG) Business Case & Operations Plan acts as a reference guide for information gathered during the Select and Implement an Email Security...

Email Security Gateway Vendor Demo Script

Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.

Email Security Gateway RFP Template

Issuing an RFP to vendors is a critical step in your email security gateway solution selection process.

Low Risk Information Acceptable Use Policy

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different...

High Risk Information Acceptable Use Policy

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different...

Pattern Analysis Template

This template will help organizations identify which big data patterns solve which business issues. You can then evaluate the benefits of each pattern, which will help...

Information Organization Program Manual

The Program Manual serves as the basis for maintaining the Information Organization practice within the enterprise.
GET HELP Contact Us
×
VL Methodology