policies

Develop and Deploy Security Policies

Blueprint: Security

Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities or compliance requirements, and they are rarely comprehensive. Without a strong lifecycle to keep policies up to date and easy to use, end users will ignore or work around poorly...

Backup and Recovery Policy Template

Templates And Policies: Data & Business Intelligence

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Acceptable Use of Technology Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Physical and Environmental Security Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Identity and Access Management Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Network and Communications Security Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

System Configuration and Change Management Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Awareness and Training Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Incident Management Policy Template

Templates And Policies: Security

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Develop Infrastructure & Operations Policies and Procedures

Blueprint: Infrastructure & Operations

IT policies are written, approved, signed – and forgotten for years because no one has time to maintain or enforce them. Create effective policies for Infrastructure & Operations that are maintainable, reasonable, measurable, auditable, and enforceable.

Internet Acceptable Use Policy

Templates And Policies: Templates & Policies

Internet usage is both a necessary tool and a potential distraction and security risk. With capabilities of the Internet and users advancing daily, it is important for organizations to construct a policy around usage during working hours and on company resources.

Right-Size the Information Governance Program

Blueprint: Data & Business Intelligence

All business initiatives use or create information. Start governing the information as an asset to ensure success of new business initiatives.

High Risk Information Acceptable Use Policy

Templates And Policies: Data & Business Intelligence

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different organizations across two industries.

Low Risk Information Acceptable Use Policy

Templates And Policies: Data & Business Intelligence

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different organizations across two industries.

Review and Improve Your IT Policy Library

Blueprint: CIO

IT policies are necessary from a risk mitigation perspective, but they are often left as an afterthought by the business. As a result, IT policies often do not adequately mitigate risks, have fallen out of date, and are not well known or adhered to by employees.

Policy Template

Templates And Policies: CIO

This general policy template is designed as a starting point for writing clear, consistent, and concise policies. More specific policy templates can be found by searching Info-Tech's website.

IT Management & Policies

Academy Course: CIO

Find the right balance between risk mitigation and operational efficiency.This course makes up part of the Strategy & Governance Certificate.

10 Days of Policies

Note: Small Enterprise Resources

Manage your IT processes and procedures effectively by leveraging Info-Tech’s research on IT policy management and implementation. Each of these ten policy pieces provides targeted information around policy benefits, industry trends and statistics, as well as additional Info-Tech research.

The policies leveraged are as follows: Hardware Asset Disposition PolicyMobile Device Acceptable Use PolicyPassword PolicyPrinter PolicyInternet Acceptable Use PolicyEmail Acceptable Use PolicyPatch Management PolicyIT Triage and Support PolicySoftware Acquisition PolicyData Backup Policy .

Improve Your Cybersecurity Posture Through Effective Policy

Live Webinar:

Many organizations have some cybersecurity policies in place but are unsure of their effectiveness.

Develop a Comprehensive Hardware Asset Management Strategy

Blueprint:

Just like any worthwhile IT project, HAM requires time and effort to put the right people in place, adjust processes, and implement the right technology.

Equipment Use Policy

Templates And Policies: Infrastructure & Operations

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on the equipment.

Embrace Information Lifecycle Management in Your ECM Program

Blueprint: Data & Business Intelligence

Not all information assets are created equal; you need a structured approach to handling your organization’s information assets from creation to destruction that considers the value and risk associated with each asset. Embrace information lifecycle management in your overall ECM program.

ILM Policy Need Identification Tool

Tool: Data & Business Intelligence

Use this tool to track your ILM policy planning and development as part of the information lifecycle management project.

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019