The anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help...
|
|
The desktop move/add/change policy provides guidelines for end users to request a move, add, or change to their desktop computing environments.
|
|
The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...
|
|
Standard Operating Procedures (SOPs) are integral to effectively managing IT processes. Flowchart SOPs (Standard Operating Procedures) are best suited to procedures that...
|
|
Standard Operating Procedures (SOPs) are integral to effectively managing IT processes. Utilize this template to help write a hierarchical-style SOP (Standard Operating...
|
|
The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
|
The equipment loan policy provides rules for short-term and long-term use for employees within an organization. Equipment can be borrowed for travel or remote work, etc.
|
|
The on-call policy’s purpose is to establish a policy and procedures relating to expectations and compensation for employees required to be placed on on-call status...
|
|
Organizations embarking on the selection process for an IP Telephony (IPT) solution may elect to issue a Request for Proposal (RFP) after determining their final...
|
|
A co-location Service Level Agreement (SLA) provides a definition of performance for the negotiated service. SLAs ensure accountability on the part of the service...
|
|