System Configuration Management Policy – NIST

Use Info-Tech's Configuration Management Policy to define how configurations will be managed.

System Maintenance Policy – NIST

Use Info-Tech's Maintenance Policy to define how system maintenance procedures will operate.

Desktop Move/Add/Change Policy

The desktop move/add/change policy provides guidelines for end users to request a move, add, or change to their desktop computing environments.

Mobile Device Connectivity & Allowance Policy

The mobile device connectivity and allowance policy enables a secure and productive workforce by outlining the policies regarding mobile device connectivity.

Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...

GPS Cell Phone Policy

The GPS Cell Phone policy allows employees to do their jobs effectively. This policy supports the guidelines for appropriate use and other administrative issues relating...

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

Hardware Sanitization Policy

The hardware sanitization policy protects the intellectual property of an organization’s confidentiality and personal information.

Guest Wireless Internet Acceptable Use Policy

The guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company.

BYOC Acceptable Use Policy

The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a...
GET HELP Contact Us
×
VL Methodology