IT Policies

A clear, well-defined policy can help keep your organization running smoothly. Our ready-made policies can be used as is or customized to fit your specific needs.

  • Tools & Templates

    Network security policy

    This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the poli...

    May 2017 by Tech Pro Research

  • Tools & Templates

    Information security incident reporting policy

    Make sure your employees know how to spot potential security breaches and how they should respond. This policy describes the signs that might point to a security incident and offers guidelines on the ...

    May 2017 by Tech Pro Research

  • Tools & Templates

    Employee termination policy

    Whether due to resignation, layoff, or firing, separating employees from the business is never a pleasant process. Even so, it’s critical to follow a systematic procedure to ensure that all necessary ...

    May 2017 by Tech Pro Research

  • Tools & Templates

    Ergonomics policy

    A safe and healthy work environment provides the foundation for all employees to be at their most productive. Not only does it promote productivity in the workforce, it also helps prevent accidents, l...

    May 2017 by Tech Pro Research

  • Tools & Templates

    IT hardware procurement policy

    A strong hardware procurement policy will ensure that requirements are followed and that all purchases are subject to the same screening and approval processes. This comprehensive policy covers the es...

    April 2017 by Tech Pro Research

  • Tools & Templates

    Software quality control policy

    Quality control is an integral part of the software development process that ensures that a finished product meets expectations through predictable and peer-checked design methods. This policy defines...

    April 2017 by Tech Pro Research

  • Tools & Templates

    Identity theft protection policy

    Help protect your employees and customers from identity theft. This policy outlines precautions for reducing risk, signs to watch out for, and steps to take if you suspect identity theft has occurred....

    April 2017 by Tech Pro Research

  • Tools & Templates

    Employee non-compete agreement policy

    Don’t let your valuable corporate assets and proprietary information walk out the door when an employee leaves the company. This non-compete agreement defines what knowledge and skills they can—and ca...

    March 2017 by Tech Pro Research

  • Tools & Templates

    BYOD (bring-your-own-device) policy

    This policy outlines requirements for BYOD usage and establishes the steps that both users and the IT department should follow to initialize, support, and remove devices from company access. These req...

    March 2017 by Tech Pro Research

  • Tools & Templates

    Hardware inventory policy

    This policy describes guidelines your organization can follow to track, process, and decommission IT equipment. From the policy: Summary The organization’s IT hardware inventory constitutes a ...

    March 2017 by Tech Pro Research