Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...

Hardware Sanitization Policy

The hardware sanitization policy protects the intellectual property of an organization’s confidentiality and personal information.

PC Power Management Policy

The power management policy defines the roles of all employee groups as well as their responsibilities when it comes to power reduction; additionally, this policy...

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Printer Policy

The printer policy is essential for business function. This policy helps control printing practices and costs within the organization.

Removable Media Acceptable Use Policy

The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...

Server Configuration Policy

The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.

Systems Monitoring and Auditing Procedural Policy

System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...

BYOC Acceptable Use Policy

The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a...

Hardware Asset Disposition Policy

Hardware Asset Management (HAM) policy is about meeting the business goals of the organization and abiding by applicable legislation while using the least resources possible.
GET HELP Contact Us
×
VL Methodology