privacy

Comply With the California Privacy Rights Act

Blueprint: Security

Starting in 2023, the California Privacy Right Act (CPRA) will supplant the current California Consumer Privacy Act (CCPA) and bring significant changes. Regardless of which jurisdiction you find your business operating, complying with the CPRA puts you in a better position, safe from potential...

California Privacy Rights Act (CPRA) Checklist

Templates And Policies: Security

Use this checklist to assess your business scope and obligations under CPRA.

Build Business-Aligned Privacy Programs for Higher Education Institutions

Blueprint: Industry Coverage

College students are living in environments that increasingly require regular interaction with information technology and data. Students are wary of privacy risks and value privacy protections. So should the leaders at the education institutions.

Student Privacy Notice

Templates And Policies: Security

A best-of-breed template to help education institutions to build a clear, concise, and compelling privacy notice.

Data Privacy Program Report

Templates And Policies: Security

This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and business-relevant context.

Data Protection Policy

Templates And Policies: Security

Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.

Modernize and Transform Your End-User Computing Strategy

Blueprint: Infrastructure & Operations

A good device is necessary for improving IT satisfaction, but it’s not enough. User support and modernizing applications are the other pivotal factors. With the COVID-19 impact on businesses, IT needs to fulfill work-from-anywhere requirements. This research is designed to help you identify...

BYOD Acceptable Use Policy

Templates And Policies: Infrastructure & Operations

The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a company’s corporate network for business purposes.

Embed Privacy and Security Culture Within Your Organization

Blueprint: Security

A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization. But building a privacy and security culture extends beyond projects, controls, and metrics, and it...

Privacy and Security Engagement Charter

Templates And Policies: Security

The Privacy and Security Engagement Charter provides the planning canvas for the initial stages of developing the plan and supporting roadmap for privacy and security culture.

Privacy and Security Engagement Playbook

Templates And Policies: Security

Use the Privacy and Security Playbook as a convenient way to communicate the components of your privacy and security engagement initiative.

Develop a Five Year Data Architecture Plan

Blueprint: Enterprise Architecture

Cloud and mobile computing are changing where and how data is stored and accessed. Big Data and Analytics are upon us. Architect for change to reduce chaos and plan for each disruptor's impact on your environment now and into the future.

Data Integration and Virtualization Policy

Templates And Policies: Data & Business Intelligence

The data integration and virtualization policy will outline the responsibilities for mitigating the risks to personal privacy when integrating, replicating, or virtualizing personal data, and ensure data integration, replication, or virtualization only occurs when necessary.

Confidentiality and Non-Disclosure Agreement

Templates And Policies:

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this template to provide a structure for documenting a confidentiality and non-disclosure agreement with an employee or contractor.

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this template to provide a structure for documenting a confidentiality and non-disclosure agreement with an employee or contractor..

Integrate a Data Audit into the Data Management Plan

Blueprint:

A data audit profiles organizational data located in various data repositories, such as databases, data warehouses, excel spreadsheets, and cloud applications, and assesses the level of data quality and integrity.

Data Access Policy

Templates And Policies: Data & Business Intelligence

The data access policy will outline the responsibilities for the protection of institutional data and prevent unauthorized, wrongful, or malicious use.

Build a Data Privacy Program

Blueprint: Security

Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business efficiency.

Privacy Notice Template – External Facing

Templates And Policies: Security

Use this external-facing template to customize a privacy notice that provides users with a comprehensive understanding of how you process their personal data, why, and how they can manage their data.

Effectively Acquire Infrastructure Services

Blueprint: Infrastructure & Operations

Most organizations are good at procuring IT products, but few are truly good at acquiring infrastructure services. According to an Info-Tech survey, approximately 42% of organizations don’t get the value they expect in their first year of service. Follow this blueprint to boost your chances of...

Infrastructure Service RFP Template

Templates And Policies: Enterprise Architecture

Use the prefilled examples in this RFP template to procure a variety of infrastructure outsourcing services.

Telephone and Voicemail Acceptable Use Policy

Templates And Policies: Templates & Policies

Telephone and voicemail services are crucial and versatile communication tools for any business. However, they also run the risk of being repurposed for personal calls due to their convenience. Every organization needs to construct a policy to protect themselves and their employees against...

Risks addressed by this policy: Going over budget in communications due to inappropriate personal employee phone calls Offensive and inappropriate employee behavior and telephone/voicemail messages Reduced availability of phone lines due to excessive personal usage Legal and confidentiality/privacy obligations via monitoring phone transmissions

Navigate the Digital ID Ecosystem to Enhance Customer Experience

Blueprint: CIO

Digital identity has many dimensions and categories, and its ecosystem's sustainability lies in the key principles it is built on. It is crucial to understand its key success factors, as well as the risks and opportunities that it presents to formulate an approach for adopting the digital identity.

Familiarize Yourself With the Digital ID Ecosystem Taxonomy

Templates And Policies: CIO

This taxonomy is a collection of the essential terms and definitions in the digital identity landscape.

Reduce and Manage Your Organization’s Insider Threat Risk

Blueprint: Security

The hard digital wall has crumbled. The focus of organizations has been to protect themselves from the outside, but they equally need to assess and protect themselves from insider threats. Poor visibility into your insider threats can’t continue as insider threats have become ubiquitous,...

Employee Monitoring Policy – IT-Facing

Templates And Policies: Security

Policy notifying employees of any monitoring that takes place on the systems they use.

Employee Monitoring Policy – Employee-Facing

Templates And Policies: Security

Policy notifying employees of any monitoring that takes place on the systems they use.

Information Technology Standards Policy

Templates And Policies: Templates & Policies

The IT standards policy organizes standards by technology category, distinguishes standards from preferred products, and documents products or policy standards that govern technology acquisition.

This policy establishes standards and guidelines for a company’s information technology (IT) environment to ensure the confidentiality, integrity, and availability of company computing resources.

Secure Operations in High-Risk Jurisdictions

Blueprint: Security

Security leaders who support operations in high-risk jurisdictions contend with unique risk scenarios, including local compliance risk, high-risk travel, and telework from high-risk jurisdictions. Follow Info-Tech’s approach to secure global operations and protect critical assets.

Guidelines for Compliance With Local Security and Privacy Laws Template

Templates And Policies: Security

Use this template to develop guidelines for compliance with local security and privacy laws.

Effectively Manage CxO Relations

Blueprint: CIO

As technology becomes increasingly important, the modern CIO will need to leverage their expansive partnerships to demonstrate the business value of IT. CIOs struggling to foster relationships and expand their sphere of influence risk obsolescence with the emergence of new C-suites like the...

Personal Relationship Management Journal Template

Templates And Policies: CIO

Use this template as an example to help you create your confidential personal relationship journal.

Instant Messaging Usage and Security Policy

Templates And Policies: Security

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019