Policy Management

The Role of Policy in the ITAM Maturity Process

No one can dispute that IT assets and the information that they process, store and transmit present a huge risk to organizations. Every organization has the responsibility to protect their data from hackers and phishers, and that means that it is imperative to shape human behavior as it relates to the handling of IT assets. How users should interact with ...

Read More »

Policies for Pad Computing Mobility – Going Mobile? – First Get a Roadmap

By Ed Cartier, xAssets Ltd. ITAK Volume 6 Issue 2    Anyone who really believes that pad-computers (hereafter “pads” to save some ink and paper) won’t invade just about everyone’s IT infrastructure in the next year or so is woefully naïve.  Strong words?  Not really.  First, that’s not just my opinion.  The consensus of the research companies (the ones that ...

Read More »

Review Your Policies – QSP: Defining the Policy Review Process

By Barbara Rembiesa, President and CEO of IAITAM ITAK V4 I7 Your organization probably has more policies in place than one could count. These policies can range from organizational activities and procedures to behavioral requirements while at work. These policies are important to daily function, but sometimes overlap occurs between two policies. They essentially say the same thing in two ...

Read More »