IT Policies
Mobile Phone Acceptable Use PolicyMobile phones, smartphones, and related technology are invaluable business tools. However, without clear policies in place these tools may become liabilities. Use this... |
|
Remote Access PolicyWorking off-site is often convenient, but employees still need access to network resources from remote locations. Access needs to be managed with the best interests of... |
|
Administrative Rights PolicyThe decision whether or not to grant computer end users administrative rights is hotly contested, and irritating to enforce. However, in an environment where security is... |
|
E-Mail and Messaging Acceptable Use PolicyThis template provides enterprises with a measuring-stick against which to weigh existing policy, as well as a foundation for new enterprises designing this policy for... |
|
Internet Acceptable Use PolicyMost organizations that provide Internet access to their employees have put in place an Internet Acceptable Use Policy. Some of these policies have been in place,... |
|
Printer PolicyPrinting is an essential business function, yet it is often not closely governed, leading to exorbitant and unnecessary costs. Develop and implement a printer policy to... |
|
Software Installation PolicyThe goal of a Software Installation Policy is to identify permitted standard software titles, clearly communicate what is prohibited, and outline proper procedures for... |
|
Technology Use Monitoring PolicyMany organizations monitor the usage of technology to ensure compliance with regulation, organizational policy, and law. Monitoring technology usage is a delicate... |
|
Telephone and Voicemail Acceptable Use PolicyTelephony is one technology often taken for granted. As a result, it is very easy for employees to intentionally or inadvertently misuse telephony tools for non-business... |
|
Password PolicyPasswords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible they must... |
|