Tagged - Policies

Data Access Policy

The data access policy will outline the responsibilities for the protection of institutional data and prevent unauthorized, wrongful, or malicious use.

Data Archiving Policy

The data archiving policy will outline the responsibilities for appropriately preserving and protecting corporate data.

End-User Computing Focus Group Survey

Gain a better grasp on what end users expect from end-user computing.

End-User Computing Strategy and Roadmap TCO Calculator

End-user computing options grow more and more complex. Estimate costs and keep on budget using a five-year TCO calculator.

Low Risk Information Acceptable Use Policy

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different...

High Risk Information Acceptable Use Policy

Start with best practice templates to define the needed policies and end-user guidance. This policy document contains the combined best practices of 15 different...

Data Provenance Policy

The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through improper sourcing, misuse,...

Data Entry Policy

The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of the organization.

Data Steward

Data stewards are designated employees with a mandate and accountability for improving the data quality and integrity in their particular business area or data silo. They...

Chief Privacy Officer

The role of the Chief Privacy Officer is to provide vision and leadership for developing and supporting initiatives critical to the organization's information privacy...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us