eDiscovery Procedure for Legal Search

Use this template to describe the activities and responsibilities required to effectively respond to a discovery request.

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance hospital IT security compliance.

DR Team Build Sheet

Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...

PCI DSS 2.0: On the Right Track!

October 2010 saw the introduction of a new version of the payment card industry data security standard (PCI DSS). Understand the implications of changes within PCI DSS 2.0...

Endpoint Encryption Solution RFP Template

Issuing RFPs is a critical step in your vendor selection process. This RFP template comes populated with important elements you don't want to forget. A detailed RFP saves...

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and keep...

Enterprise Anti-Malware Evaluation & RFP Response Tool

For organizations that have issued a formal Request for Proposal (RFP) to evaluate enterprise anti-malware vendors, gathering and scoring the various responses can be...

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform vendors. To complicate...

North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

Confidentiality and Non-Disclosure Agreement

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this template...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us