Templates & Policies

Physical Access Policy

Physical access controls define who is allowed physical access to facilities that house information systems, and to the information systems within those facilities and/or...

Purchasing Policy

The purchasing policy outlines the standards and procedures associated with company purchases of IT computer-related components and technical services.

Software Request Form

The software request form outlines the approval process for requesting the installation of software on end-user devices.

Software Acquisition and Usage Policy

Use Info-Tech's sample policy to launch software acquisition management efforts to the top of your priority list.

Software Development Policy

The software development policy outlines the standard for corporate software development and code management.

Limited Personal Use of Network Resources Policy

The limited personal use of network resources policy outlines the standards for appropriate usage of corporate network resources.

Anti-Harassment Policy

The anti-harassment policy outlines the standards for preventing and dealing with harassment cases in the workplace.

Email Acceptable Use Policy

The email acceptable use policy outlines the standards for appropriate use of corporate email accounts.

Instant Messaging Usage and Security Policy

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.

PDA Usage Policy

The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us