Templates & Policies

Risk Assessment Policy – NIST

Use Info-Tech's Risk Assessment Policy to define the parameters of your risk assessment program, including the frequency of evaluation.

Anti-Harassment Policy

The anti-harassment policy outlines the standards for preventing and dealing with harassment cases in the workplace.

Cryptography Policy – ISO

The purpose of this policy is to ensure correct use of cryptography to protect the confidentiality, authenticity, and integrity of the organization’s information.

Application Security Procedural Policy

The purpose of an application security policy is to guide developers through the software development lifecycle to assure employee access to the computing resources and...

Data Backup Policy

The data backup policy will outline the mechanisms to help safeguard corporate data using regular backups and have data available in the event of a catastrophic system...

Telework Policy

The telework policy will outline the standards and procedures for employees planning to work at home or another secondary work site location (telework).

System and Communications Security Policy – NIST

The purpose of this policy is to ensure security is a key consideration in network management and in the transfer of information in and out of the organization.

Overtime Policy

The overtime policy will outline the standards for regular employee eligibility and compensation for overtime.

Stakeholder Power Map Template

Identify and prioritize the stakeholders that are important to your IT strategy development effort.

IT Strategy Development Project Charter Template

Approach your IT strategy development effort as a project, managing the aspects of scope, time, cost, quality, human resources, risk, procurement, communications, and...
GET HELP Contact Us
×
VL Methodology