Templates & Policies

Instant Messaging Usage and Security Policy

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.

On-Call Policy

The on-call policy’s purpose is to establish a policy and procedures relating to expectations and compensation for employees required to be placed on on-call status...

Equipment Loan Policy

The equipment loan policy provides rules for short-term and long-term use for employees within an organization. Equipment can be borrowed for travel or remote work, etc.

Requirements Gathering Process Flow Diagram Template

This template will assist organizations in mapping their requirements gathering process. It comes prepopulated with a standard requirements gathering process, but can...

ISO 27001:2013 Annex A Self-Check List

Use this check list to assess your CMM level based on ISO 27001:2013.

IP Telephony RFP Template

Organizations embarking on the selection process for an IP Telephony (IPT) solution may elect to issue a Request for Proposal (RFP) after determining their final...

Quarterly Metrics Review with the CIO

Establish quarterly metric reviews with your CIO to support capacity planning and management. Use this template to create a metrics report for your CIO.

Anti-Virus Policy

The anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help...

Data Center Co-location SLA & Service Definition Template

A co-location Service Level Agreement (SLA) provides a definition of performance for the negotiated service. SLAs ensure accountability on the part of the service...

Data Center Co-location Site Visit and Evaluation Checklist

Vendor co-location site visits can validate decisions or uncover vendor inadequacies and biases. Conduct site visits to shortlisted data center co-location vendors to add...
GET HELP Contact Us
×
VL Methodology