Templates & Policies

Risk Assessment Policy – NIST

Use Info-Tech's Risk Assessment Policy to define the parameters of your risk assessment program, including the frequency of evaluation.

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

Cryptography Policy – ISO

The purpose of this policy is to ensure correct use of cryptography to protect the confidentiality, authenticity, and integrity of the organization’s information.

Application Security Procedural Policy

The purpose of an application security policy is to guide developers through the software development lifecycle to assure employee access to the computing resources and...

Telework Policy

The telework policy will outline the standards and procedures for employees planning to work at home or another secondary work site location (telework).

System and Communications Security Policy – NIST

The purpose of this policy is to ensure security is a key consideration in network management and in the transfer of information in and out of the organization.

Overtime Policy

The overtime policy will outline the standards for regular employee eligibility and compensation for overtime.

Mobile Device Reimbursement Policy

The mobile device reimbursement policy will outline the devices and voice/data plans that qualify for corporate reimbursement and the limits of corporate reimbursement of...

Stakeholder Power Map Template

Identify and prioritize the stakeholders that are important to your IT strategy development effort.

IT Strategy Development Project Charter Template

Approach your IT strategy development effort as a project, managing the aspects of scope, time, cost, quality, human resources, risk, procurement, communications, and...
GET HELP Contact Us
×
VL Methodology