IT Policies

A clear, well-defined policy can help keep your organization running smoothly. Our ready-made policies can be used as is or customized to fit your specific needs.

  • Tools & Templates

    Securing Linux policy

    Linux has been the backbone of many businesses for decades. It has powered web servers, database systems, development machines, and employee workstations. And as with any OS, it’s essential to ensure ...

    September 2017 by Tech Pro Research

  • Tools & Templates

    Mobile device computing policy

    Mobile devices offer convenience and flexibility for the modern workforce—but they also bring associated risks and support issues. This policy establishes guidelines to help ensure safe and productive...

    August 2017 by Tech Pro Research

  • Tools & Templates

    Corporate gaming policy

    Video games can benefit companies by giving employees a recreational outlet to build cooperation and morale. But they can also create problems if misused. This policy will help you establish the groun...

    August 2017 by Tech Pro Research

  • Tools & Templates

    Configuration management policy

    Implementing a configuration management strategy can involve a lot of work up front, but it will pay off in the long run by making day-to-day administrative life easier. This policy provides guideline...

    August 2017 by Tech Pro Research

  • Tools & Templates

    Home usage of company-owned equipment policy

    Employees who work from home often use company-supplied systems and devices, which helps ensure that they have consistent, state-of-the-art equipment to do their work. However, organizations should pr...

    July 2017 by Tech Pro Research

  • Tools & Templates

    Hardware decommissioning policy

    When decommissioning hardware, standard and well-documented practices are critical. The steps outlined in this policy will guide your staff methodically through the process. Assets won’t be unnecessar...

    July 2017 by Tech Pro Research

  • Tools & Templates

    DHCP usage policy

    DHCP makes life easier for IT staff and employees, allowing computer systems and devices to quickly be connected to a network and given necessary access. The alternative of using permanent (or static)...

    July 2017 by Tech Pro Research

  • Tools & Templates

    Securing Windows policy

    Windows is not without certain issues and flaws. Like any operating system it has been exposed to numerous vulnerabilities, both deliberate (viruses) and unintentional (exploitable holes in programs o...

    June 2017 by Tech Pro Research

  • Tools & Templates

    Shadow IT policy

    This policy provides guidelines for the appropriate use of shadow IT, explains the restrictions that will apply to it, and defines elements pertaining to employee and IT department responsibilities. ...

    June 2017 by Tech Pro Research

  • Tools & Templates

    Network security policy

    This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the poli...

    May 2017 by Tech Pro Research