Vendor Management - Templates & Policies

Internet Acceptable Use Policy

Internet usage is both a necessary tool and a potential distraction and security risk. With capabilities of the Internet and users advancing daily, it is important for...

PDA Usage Policy

The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...

Telephone and Voicemail Acceptable Use Policy

Telephone and voicemail services are crucial and versatile communication tools for any business. However, they also run the risk of being repurposed for personal calls...

Taxonomy Quality Assurance Policy

The taxonomy quality assurance policy has been established in order to preserve the accuracy of categorized folders, files, and directory structures available on network...

Hardware Sanitization Policy

The hardware sanitization policy protects the intellectual property of an organization’s confidentiality and personal information.

Remote Access Policy

The remote access policy creates restrictions for connecting to a company’s internal network from external hosts via remote access technology or for utilizing the...

Removable Media Acceptable Use Policy

The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...

Server Configuration Policy

The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.

Server Backup Policy

The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...

Stakeholder Power Map Template

Identify and prioritize the stakeholders that are important to your IT strategy development effort.
GET HELP Contact Us
×
VL Methodology