The guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company.
|
|
The mobile device connectivity and allowance policy enables a secure and productive workforce by outlining the policies regarding mobile device connectivity.
|
|
Hardware Asset Management (HAM) policy is about meeting the business goals of the organization and abiding by applicable legislation while using the least resources possible.
|
|
The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.
|
|
The remote access policy creates restrictions for connecting to a company’s internal network from external hosts via remote access technology or for utilizing the...
|
|
The power management policy defines the roles of all employee groups as well as their responsibilities when it comes to power reduction; additionally, this policy...
|
|
The desktop move/add/change policy provides guidelines for end users to request a move, add, or change to their desktop computing environments.
|
|
Most organizations are good at procuring IT products, but few are truly good at acquiring infrastructure services. According to an Info-Tech survey, approximately 42% of...
|
|
Use this vendor management template to track your communications with the vendor and prepare for regular service reviews.
|
|
Use this Service Acquisition Planning and Tracking Tool to plan your acquisition activities and track progress.
|
|