Topics
-
CIO332
-
Infrastructure & Operations362
-
Enterprise Architecture239
-
Applications273
-
Project & Portfolio Management169
-
Data & Business Intelligence133
-
Security202
-
Vendor Management99
-
Templates & Policies168
-
-
Application Development20
-
Budgeting/Procurement14
-
Collaboration2
-
Communications4
-
Data & Digital Assets15
-
Department Governance31
-
Desktop Systems6
-
Disaster & Continuity12
-
Email & Messaging4
-
End-User Support6
-
Enterprise Applications20
-
Hardware19
-
HR Management11
-
Mobile & Wireless13
-
Network Management5
-
Operating Systems1
-
Operations13
-
Project Management24
-
Security38
-
Small Business Essentials9
-
Small Business Extras4
-
Storage7
-
Web Site Development4
-
Types of Content
System Configuration Management Policy – NISTUse Info-Tech's Configuration Management Policy to define how configurations will be managed. |
|
System Maintenance Policy – NISTUse Info-Tech's Maintenance Policy to define how system maintenance procedures will operate. |
|
Desktop Move/Add/Change PolicyThe desktop move/add/change policy provides guidelines for end users to request a move, add, or change to their desktop computing environments. |
|
Mobile Device Connectivity & Allowance PolicyThe mobile device connectivity and allowance policy enables a secure and productive workforce by outlining the policies regarding mobile device connectivity. |
|
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
GPS Cell Phone PolicyThe GPS Cell Phone policy allows employees to do their jobs effectively. This policy supports the guidelines for appropriate use and other administrative issues relating... |
|
Guest Wireless Internet Acceptable Use PolicyThe guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company. |
|
System Change Control Procedural PolicyConfiguration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,... |
|
Systems Monitoring and Auditing Procedural PolicySystem monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these... |
|
BYOC Acceptable Use PolicyThe purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a... |
|