Remote Access Policy

The remote access policy creates restrictions for connecting to a company’s internal network from external hosts via remote access technology or for utilizing the...

Printer Policy

The printer policy is essential for business function. This policy helps control printing practices and costs within the organization.

Server Configuration Policy

The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.

Removable Media Acceptable Use Policy

The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...

Desktop Move/Add/Change Policy

The desktop move/add/change policy provides guidelines for end users to request a move, add, or change to their desktop computing environments.

Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...

Laptop Loan Policy

The laptop loan policy provides short-term and long-term use for employees within an organization. Laptops can be borrowed for travel or while waiting on service from...

Hardware Sanitization Policy

The hardware sanitization policy protects the intellectual property of an organization’s confidentiality and personal information.

Hardware Asset Disposition Policy

Hardware Asset Management (HAM) policy is about meeting the business goals of the organization and abiding by applicable legislation while using the least resources possible.

Systems Monitoring and Auditing Procedural Policy

System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...
GET HELP Contact Us
×
VL Methodology