
Today On Premium
-
TechRepublic Premium -
TechRepublic Premium Hiring kit: Python developer
-
TechRepublic Premium Hiring kit: Network architect
-
TechRepublic Premium Hiring kit: Data architect
Premium Library
-
TechRepublic Premium Supplier management policy
Information technology depends upon the acquisition of products and services for use by the business to achieve operational goals and become profitable. Building and managing productive relationships with suppliers (the description of which includes vendors) is an integral responsibility for many IT departments. Ensuring suppliers are properly vetted, negotiated with, and serve as a valuable ...
-
TechRepublic Premium Streaming media policy
Although there are many legitimate business reasons to access streamed audio and video files — such as engaging in training, reviewing industry-related content and conducting research — there are also opportunities for misuse. This policy provides guidelines for the appropriate use of streaming media on systems and devices that access company networks. From the policy: ...
-
TechRepublic Premium COVID-19 workplace policy
The COVID-19 workplace policy from TechRepublic Premium describes the procedures the organization has adopted in an attempt to minimize the spread of coronavirus infections. From the policy: Purpose The purpose of the COVID-19 workplace policy is to ensure all individuals entering organization facilities understand and abide by COVID-19 protocols. The guidelines described within this policy ...
-
TechRepublic Premium Software licensing policy
Organizations spend a fortune on software licenses every year, and a lack of management around it can result in heavy fines. This policy will help you establish guidelines to make sure you’re in compliance and that any audits will be painless. From the policy: Staying in compliance with software licenses can be quite difficult. End ...
-
TechRepublic Premium IT hardware procurement policy
A strong hardware procurement policy will ensure that requirements are followed and that all purchases are subject to the same screening and approval processes. This comprehensive policy covers the essential aspects of the purchasing process. From the policy: PURPOSE This policy establishes a framework for the purchase of company hardware in a fashion that will: ...
-
TechRepublic Premium Auditing and logging policy
Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...
-
TechRepublic Premium Shadow IT policy
Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...
-
TechRepublic Premium Vendor contract renewal planner
Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...
-
TechRepublic Premium Access management policy
Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...
-
TechRepublic Premium IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy from TechRepublic Premium offers guidelines for governing access to critical systems and confidential data. From the policy: SUMMARY IT ...
Upcoming Downloads
- Hiring Kit: Human resource specialist
- Hiring Kit: Computer Forensic Analyst
- Hiring Kit: Blockchain Engineer