Templates & Policies

Guest Wireless Internet Acceptable Use Policy

The guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company.

Data Entry and Provenance Policy

The data entry and provenance policy will outline the responsibilities for maintaining the integrity and quality of data and provenance data used to inform corporate...

Data Archiving Policy

The data archiving policy will outline the responsibilities for appropriately preserving and protecting corporate data.

Data Access Policy

The data access policy will outline the responsibilities for the protection of institutional data and prevent unauthorized, wrongful, or malicious use.

Data Management Policy

The data management policy will outline the standards for uniform management of all corporate critical data.

Data Cleansing and Quality Policy

The data cleansing and quality policy will outline the responsibilities for ensuring that all corporate data adheres to the principles of data quality and that redundant...

Data Integration and Virtualization Policy

The data integration and virtualization policy will outline the responsibilities for mitigating the risks to personal privacy when integrating, replicating, or...

Change Control – Freezes & Risk Evaluation Policy

The purpose of this policy is to ensure that IT staff recognize that changes to computer systems tend to destabilize those systems.

Document Retention Policy

The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...

Server Backup Policy

The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us