IT Policies

A clear, well-defined policy can help keep your organization running smoothly. Our ready-made policies can be used as is or customized to fit your specific needs.

  • Tools & Templates

    Ethics policy: Vendor relationships

    This policy spells out what IT employees should and shouldn’t do when dealing with vendors and suppliers. It covers everything from record keeping to conflicts of interest to gifts and gratuities. Fr...

    July 2016 by Tech Pro Research

  • Tools & Templates

    Software automation policy guidelines

    Software automation policies are system-defined, or administrator-defined, sets of rules that govern the execution of automated actions. Examples of automated actions include running a report using th...

    April 2016 by Mary Shacklett

  • Tools & Templates

    Machine automation policy guidelines

    Machine automation is widely used across diverse industry sectors because it is cost-effective and risk reducing. Its applications include but are not limited to: CNC machines in manufacturing and fa...

    March 2016 by Mary Shacklett

  • Tools & Templates

    Software usage policy

    In order to maintain a consistent, predictable and supportable computing environment it is essential to establish a pre-defined set of software applications for use on workstations, laptops, mobile de...

    February 2016 by Tech Pro Research

  • Tools & Templates

    Drone policy

    Unmanned Aircraft Systems (UAS), more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications as of late. Delivering packages, recording t...

    January 2016 by Tech Pro Research

  • Tools & Templates

    Virtual and augmented reality policy

    Virtual reality (VR) and augmented reality (AR) are concepts which are going mainstream in both consumer and business operations. Both have shown incredible potential and versatility across a wide ran...

    January 2016 by Tech Pro Research

  • Tools & Templates

    Virtualization policy

    Virtualization allows companies to run applications, operating systems and even networks in a sort of logical “sandbox” which eliminates the need for much physical hardware. While the virtual hosts th...

    December 2015 by Tech Pro Research

  • Tools & Templates

    Internet and Email usage policy

    Engaging in internet access and electronic communications is often a core job duty for employees across all aspects of the business. It’s rare indeed to find any organization today in which employees ...

    November 2015 by Tech Pro Research

  • Tools & Templates

    Internet and E-mail usage lunch and learn presentation

    This pre-packaged presentation contains everything you need to instruct end users about the proper use of e-mail and Internet resources in your organization--even if you don't consider yourself a publ...

    November 2015 by Tech Pro Research

  • Tools & Templates

    Information security policy

    Information is the lifeblood of the business. Without it, employees cannot work, customers cannot interact with the business, bills cannot be paid, and profits cannot be earned. Any given technologica...

    September 2015 by Tech Pro Research