Today On Premium
-
TechRepublic Premium -
TechRepublic Premium Google Docs tips for advanced users
-
TechRepublic Premium Google Chrome: Security and UI tips you need to know
-
TechRepublic Premium Ergonomics policy
Premium Library
-
TechRepublic Premium Internet of Things policy
These guidelines cover the procurement, usage and administration of IoT devices, whether provided by the company or employee owned. From the policy: SUMMARY The Internet of Things refers to network- or internet-connected devices, such as appliances, thermostats, monitors, sensors and portable items, that can measure, store and transmit information. IoT devices may be business oriented, ...
-
TechRepublic Premium Internet and email usage policy
Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access, such as viruses, ransomware and data theft, all of which result from unsafe practices. In other words, infections can occur just from connecting ...
-
TechRepublic Premium Hiring kit: Principal software engineer
Developing software in a modern business enterprise requires cooperation, collaboration and coordination. Long gone are the days when a single mythical coder can single-handedly develop software applications sophisticated and flexible enough for modern business needs. Successfully managing the development of quality software in such an environment requires a deft touch of experience. This is a ...
-
TechRepublic Premium Extended sick leave policy
It’s an unfortunate event when an employee becomes severely ill and requires an extended sick leave from work, but companies should have a plan in place for these situations. This plan needs to ensure that both the employee and the company have a set of duties and responsibilities and provide a fair arrangement for all ...
-
TechRepublic Premium Email/Instant Message/voicemail retention policy
Maintaining electronic communications in business involves walking a fine line. Employees want relevant information to be kept available for future reference so that they can do their jobs, but keeping these items long-term can pose security and resource risks. Server hard drives can fill up, or stolen data (even if outdated) might pose a threat ...
-
TechRepublic Premium Supplier management policy
Information technology depends upon the acquisition of products and services for use by the business to achieve operational goals and become profitable. Building and managing productive relationships with suppliers (the description of which includes vendors) is an integral responsibility for many IT departments. Ensuring suppliers are properly vetted, negotiated with, and serve as a valuable ...
-
TechRepublic Premium Streaming media policy
Although there are many legitimate business reasons to access streamed audio and video files — such as engaging in training, reviewing industry-related content and conducting research — there are also opportunities for misuse. This policy provides guidelines for the appropriate use of streaming media on systems and devices that access company networks. From the policy: ...
-
TechRepublic Premium COVID-19 workplace policy
The COVID-19 workplace policy from TechRepublic Premium describes the procedures the organization has adopted in an attempt to minimize the spread of coronavirus infections. From the policy: Purpose The purpose of the COVID-19 workplace policy is to ensure all individuals entering organization facilities understand and abide by COVID-19 protocols. The guidelines described within this policy ...
-
TechRepublic Premium Software licensing policy
Organizations spend a fortune on software licenses every year, and a lack of management around it can result in heavy fines. This policy will help you establish guidelines to make sure you’re in compliance and that any audits will be painless. From the policy: Staying in compliance with software licenses can be quite difficult. End ...
-
TechRepublic Premium IT hardware procurement policy
A strong hardware procurement policy will ensure that requirements are followed and that all purchases are subject to the same screening and approval processes. This comprehensive policy covers the essential aspects of the purchasing process. From the policy: PURPOSE This policy establishes a framework for the purchase of company hardware in a fashion that will: ...
Upcoming Downloads
- July 18: Checklist: How to Create a Team Charter -- $19
- July 18: Desktop Migration Checklist -- $19
- July 18: Nondisclosure Policy -- $29
- July 19: 7 Steps for Onboarding Remote Employees -- $29
- July 19: eLearning and Continuing Education Policy -- $29
- July 19: Job Description: SAP Developer -- $19
- July 20: Feature Comparison: CRM Software and Services -- $19
- July 20: Quick Glossary: 5G Technology -- $19
- July 20: Intrusion Detection Policy -- $29
- July 21: Conflict of Interest Disclosure Policy -- $19
- July 24: Budget Planning Tool -- $29
- July 24: Corporate Computer Naming Policy -- $19
- July 24: Auditing and Logging Policy -- $29
- July 25: Checklist: Onboarding/Offboarding C-Level Executives -- $19
- July 25: Quick Glossary: Metaverse -- $29
- July 25: Job Description: MongoDB Administrator -- $19
- July 26: Commercial Endorsement Policy -- $19
- July 26: Checklist: Securing Digital Information -- $19
- July 26: Project Prioritization Tool: An Automated Workbook -- $29
- July 26: System Update Policy -- $29
- July 27: Consultant Evaluation Checklist -- $19
- July 27: Configuration Management Policy -- $29
- July 27: Video Surveillance Policy -- $29
- July 27: System Monitoring Policy -- $29
- July 28: Bring Your Own Device Approval Form -- $19