Templates & Policies

Data Center Relocation Project Wrap-up Checklist

Relocating the Data Center is a large undertaking that involves a great deal of old and new equipment. Decommissioning the old data center facility ensures that all...

Data Center Move Issue Resolution and Change Order Template

Whether the data center relocation or consolidation project requires one weekend or multiple move dates to complete, it is important to collect and document all issues,...

Data Center Relocation Project Charter Template

A data center relocation project charter is essential to the planning phase of the project to identify scope and hit the ground running. It lays out important information...

Data Center Co-location Site Visit and Evaluation Checklist

Vendor co-location site visits can validate decisions or uncover vendor inadequacies and biases. Conduct site visits to shortlisted data center co-location vendors to add...

Data Center Co-location SLA & Service Definition Template

A co-location Service Level Agreement (SLA) provides a definition of performance for the negotiated service. SLAs ensure accountability on the part of the service...

Web Content Filter Test Checklist

When testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the...

Internet Acceptable Use and Filtering Policy

All enterprises utilizing a web content filter must guide the productive use of Internet services through Internet Acceptable Use and Filtering Policies. Use this...

Testing Checklist

Testing of any software application is a critical component of the life cycle. If testing is not done with sufficient coverage, a substandard product may be deployed.

Defect Reporting Template

Communication between testers and developers is essential to the testing process. Use this template to track and and report defects so developers can fix bugs discovered...

Acceptable Usage Policy Template

Acceptable usage policies clearly indicate what information system users are and are not allowed to do. Without these policies, the potential exists that users could...
GET HELP Contact Us
×
VL Methodology