IT Infrastructure Policy Bundle
Policies and procedures to effectively manage the infrastructure of IT are the nemesis of IT executives
When a CIO or an IT Executive takes over a new job one of the greatest challenges is to quickly validate that the infrastructure that is in place. Would it not be nice to have some tools that could be use to quickly put proven world class policies in place with minimal effort. That is what the CIO IT Infrastructure Policy Bundle does.
CIO IT Infrastructure Policy Bundle
Janco has combine the policies that it has developed over time with some of the best IT organizations around the globe into a single package. With this bundle you get a PDF file that has all of the procedures in a single document that is over 300 pages long. It would take your staff months to develop these procedures from scratch. In addition you get a separate MS-Word document for each procedure which can easily be modified.
This bundle contains the following policies:
- Backup and Backup Retention Policy
- Blog and Personal Web Site Policy
- BYOD Policy Template
- Google Glass Policy Template
- Incident Communication Plan Policy
- Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy
- Mobile Device Access and Use Policy
- Patch Management - Version Control Policy
- Outsourcing and Cloud Based File Sharing Policy
- Physical and Virtual Security Policy
- Record Management, Retention, and Destruction Policy
- Sensitive Information Policy
- Service Level Agreement (SLA) Policy Template with Metrics
- Social Networking Policy
- Telecommuting Policy
- Text Messaging Sensitive and Confidential Information
- Travel, Electronic Meeting, and Off-Site Meeting Policy
- Wearable Device Policy)
- IT Infrastructure Electronic Forms
In addition to this bundle there also is a CIO Infrastructure Management Tool kit that combines many of the most popular tools with discounts up to 30% or more. In the Plaitnum Edition you can get copys of all of the IT Infrastructure Electronic forms. The forms incldued are:
- Blog Policy Compliance Agreement
- Company Asset Employee Control Log
- Disaster Recovery – Business Continuity LAN Node Inventory
- Disaster Recovery – Business Continuity Location Contact Numbers
- Disaster Recovery – Business Continuity Off-Site Inventory
- Disaster Recovery – Business Continuity Personnel Location
- Disaster Recovery – Business Continuity Plan Distribution
- Disaster Recovery – Business Continuity Remote Location Contact Information
- Disaster Recovery – Business Continuity Team Call List
- Disaster Recovery – Business Continuity Vendor List
- Email – Employee Acknowledgement
- Employee Termination Checklist
- Internet & Electronic Communication Employee Acknowledgement
- Internet Access Request
- Internet Use Approval
- Mobile Device Access and Agreement
- New Employee Security Acknowledgement and Release
- Preliminary Security Audit Checklist
- Security Access Application
- Security Audit Report
- Security Violation
- Sensitive Information Policy Compliance Agreement
CIO Infrastructure Management Tool Kit Versions
The CIO Infrastructure Management Tool Kit comes in four versions - Standard, Silver, Gold, and Platinum.
Individual Policies
All of the policies that are provided here are contained within one or more of the templates that are on this site. These policies have been added as individual documents in WORD format for those clients who just need this particular policy. All policies are Sarbanes-Oxley compliant.
Internet, E Mail, Mobile Device, Electronic Communication, and Record Retention Policy
This policy is is compliant with all recent legislation (SOX, HIPAA, Patriot Act, and Sensitive information), and covers:
- Appropriate Use of Equipment
- Mobile Devices
- Internet Access
- Electronic Mail
- Retention of Email on Personal Systems
- E-mail and Business Records Retention
- Copyrighted Materials
- Banned Activities
- Ownership of Information
- Security
- Sarbanes-Oxley
- Abuse
Included are these ready to use forms:
- Internet & Electronic Communication Employee Acknowledgement
- E-Mail - Employee Acknowledgement
- Internet Use Approval Form
- Internet Access Request Form
- Security Access Application Form
Sensitive Information Policy
This policy covers the treatment of Credit Card, Social Security, Employee, and Customer Data. The policy is 15 pages in length. This policy complies with Sarbanes Oxley Section 404.
The policy applies to the entire enterprise, its vendors, its suppliers (including outsourcers) and co-location providers and facilities regardless of the methods used to store and retrieve sensitive information (e.g. online processing, outsourced to a third party, Internet, Intranet or swipe terminals).
Travel and Off-Site Meeting Policy
Protection of data and software is often is complicated by the fact that it can be accessed from remote locations. As individuals travel and attend off-site meetings with other employees, contractors, suppliers and customers data and software can be compromised. This policy is four page in length and covers:
Outsourcing Policy
This policy is seven page in length and covers:
- Outsourcing Management Standard
- Service Level Agreement
- Responsibility
- Outsourcing Policy
- Policy Statement
- Goal
- Approval Standard
- Base Case
- Responsibilities
Note: Look at the Practical Guide for Outsourcing over 110 page document for a more extensive process for outsourcing