Defining hardware and software requirements and purchasing procedures is integral to the management of your organization's assets. Clear the confusion by implementing a...
|
|
Giving back to your community increases engagement and benefits your community partners. Use this template to guide a fundraising program in your workplace.
|
|
There are occasions where employees may be required to bring their children to work. Use this policy to minimize disruption at your workplace and set out appropriate...
|
|
Use Info-Tech's Data Protection Policy to define and document the necessary data privacy and protection controls.
|
|
Use this template to describe the the company's promotions policy.
|
|
The decision whether or not to grant computer end users administrative rights is hotly contested, and irritating to enforce. However, in an environment where security is...
|
|
Providing former employees and co-workers with a job reference is a common practice. However, inappropriate disclosure of information can bring unexpected legal trouble....
|
|
Organizations must consider the seriousness of plagiarism in the context of ethics, but also of law. Advances in electronic communication and technology, such as the...
|
|
Passwords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible they must...
|
|
Most organizations that provide Internet access to their employees have put in place an Internet Acceptable Use Policy. Some of these policies have been in place,...
|
|