Security - Templates & Policies

Confidentiality and Non-Disclosure Agreement

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...

North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

Endpoint Encryption Solution RFP Template

Issuing RFPs is a critical step in your vendor selection process. This RFP template comes populated with important elements you don't want to forget. A detailed RFP saves...

DR Team Build Sheet

Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

eDiscovery Procedure for Legal Search

Use this template to describe the activities and responsibilities required to effectively respond to a discovery request.

Backup Operating Procedures Template

Use this Backup Operating Procedures Template in conjunction with the Optimize Backup Operations with a Recovery Services Plan Storyboard to document operating procedures...

Recovery Operating Procedures Template

Use this Recovery Operating Procedures Template in conjunction with the Optimize Backup Operations with a Recovery Services Plan Storyboard to document operating...

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

PCI DSS Compliance Communication Plan

Communication is half the battle with PCI compliance. Securing stakeholder buy-in can sometimes be a challenge. Gain support by using business language and focusing on...
GET HELP Contact Us
×
VL Methodology