All Research
Topics
Password PolicyPasswords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible they must... |
|
Business Expense Reimbursement PolicyIn many organizations, employees sometimes have to make purchases on behalf of the organization. In these situations, employees should be aware of the procedures for... |
|
Plagiarism and Copyright PolicyOrganizations must consider the seriousness of plagiarism in the context of ethics, but also of law. Advances in electronic communication and technology, such as the... |
|
Employee Reference Provision PolicyProviding former employees and co-workers with a job reference is a common practice. However, inappropriate disclosure of information can bring unexpected legal trouble.... |
|
Travel Expense PolicyEnsure that traveling employees are aware of what is considered an acceptable expense and what expenses are eligible for reimbursement by the organization. Establish... |
|
Employee Status Change Policy and FormEmployee status can change for a variety of reasons, including promotion, leave of absence, transfer, termination, or change in pay. When a status change occurs, there is a... |
|
Drug and Alcohol PolicyWhile it may seem obvious to some that the use of drugs and alcohol at work is prohibited, organizations must still hold and enforce a strong drug and alcohol policy to... |
|
Applications ManagerThe Applications Manager's role is to supervise and maintain the organization's repository of software applications through best practices and the appropriate staffing and... |
|
Quality Assurance ManagerThe Quality Assurance Manager's role is to develop, establish, and enforce quality assurance standards and measures for the information technology services within the... |
|
Network AdministratorThe Network Administrator's role is to ensure the stable operation of the in-house computer network. |
|