The desktop move/add/change policy provides guidelines for end users to request a move, add, or change to their desktop computing environments.
|
|
Standard Operating Procedures (SOPs) are integral to effectively managing IT processes. Flowchart SOPs (Standard Operating Procedures) are best suited to procedures that...
|
|
The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...
|
|
Standard Operating Procedures (SOPs) are integral to effectively managing IT processes. Utilize this template to help write a hierarchical-style SOP (Standard Operating...
|
|
The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
|
The on-call policy’s purpose is to establish a policy and procedures relating to expectations and compensation for employees required to be placed on on-call status...
|
|
Organizations embarking on the selection process for an IP Telephony (IPT) solution may elect to issue a Request for Proposal (RFP) after determining their final...
|
|
The equipment loan policy provides rules for short-term and long-term use for employees within an organization. Equipment can be borrowed for travel or remote work, etc.
|
|
Use this check list to assess your CMM level based on ISO 27001:2013.
|
|
Vendor co-location site visits can validate decisions or uncover vendor inadequacies and biases. Conduct site visits to shortlisted data center co-location vendors to add...
|
|