Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.
|
|
This tool is a survey for employees to complete, confirming with their employers the health and safety of their home office.
|
|
This sample deliverable provides a guide to designing and launching successful tech ventures. It includes a best practice approach to go-to-market strategy and market...
|
|
Review the full DR plan annually to identify changes that weren’t captured via day-to-day change management.
|
|
Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...
|
|
Use checklists to streamline step-by-step procedures. Checklists are ideal when writing for experienced staff who just need a reminder of what to do, not how to do it.
|
|
The data cleansing and quality policy will outline the responsibilities for ensuring that all corporate data adheres to the principles of data quality and that redundant...
|
|
Use flowcharts and checklists to create effective SOP documents.
|
|
A checklist outlining the steps to organizational change.
|
|
Use this template to build your information security risk management process.
|
|