- Procedures Manuals
- Free Samples
- OnPolicy Software
- Cart$ 0Cart
- No products in the cart.
Develop policies and procedures to address your IT (information technology) management needs like IT security, computer usage, software development and control of computer and network assets. The editable templates identify and provide guidance and the tools required to determine the hardware, software, training, and security requirements of your organization.
Coming up with policy documentation even for common areas like acceptable email and internet use, computer asset acquisition, or network and IT security can be a daunting task. With easily editable prewritten examples, you can produce your IT policies and procedures without spending hours of research and development time.
Choose a Subcategory
Software Development Project Procedures (12)
IT Security & Disaster Recovery Procedures (8)
IT Asset Management Procedures (5)
Computer Training & IT Support Procedures (5)
Computer & IT Administration Procedures (10)
Create a well-written IT policies and procedures Manual that improves performance by enhancing consistency and establishing clear criteria for computer, network, hardware, software, IT security, and IT vendors.
Improve the management of the key functions of software development including project management, analysis, design, programming, testing and support. Download Only.
Computer & Network IT Procedures Book provides example for IT Management, IT Operations, Software Development, and IT Disaster Recovery & Security. Note: This is the “hardcover book-only” version of the IT Policies and Procedures Manual. There is no accompanying CD or electronic content and, hence, no editable files.
Make sure your company is managing its IT assets according to industry standards. Implement our downloadable and customizable IT Asset Management Policy Procedure to ensure the utmost efficiency and consistency.
Choose and manage capable IT vendors with our downloadable and customizable IT Vendor Management Policy Procedure.
Does your company have guidelines in place for employees? computer and Internet use? Implement our Computer and Internet Use Policy to ensure your employees are utilizing company time properly.
Is access to your company’s information secure? Use our IT Access Control Procedure to ensure only appropriate parties have access to your company’s information.
Implement a policy that not only identifies potential threats to your IT assets, but also evaluates and triages those risks. Our downloadable and customizable IT Risk Assessment Procedure will help your company process threats as they arise.
Control your company’s data storage with our IT Storage Policy Procedure. Downloadable and customizable, the IT storage procedure will ensure your data is safe and maintained regardless of storage medium.
Maintain your company’s IT system security with our IT Security Plan Procedure. The downloadable and customizable IT security procedure ensures your system security requirements are clear and diffuses them throughout your company.
Implement and regulate an email policy in your company with our downloadable and customizable Email Policy Procedure.
Does your company have minimum requirements for all of its IT assets? Implement our downloadable and customizable IT Standards Policy Procedure to minimize costs of building and managing your IT system.
Ensure continuity of all of your company’s operations with our downloadable and customizable IT Disaster Recovery Policy Procedure.
Make sure your company has an efficient and compliant documentation system with our IT Document Management Policy Procedure