vivitec
  • SECURITY SERVICES
  • TECHNOLOGY SERVICES
  • WHO WE ARE
    • LOCATIONS
  • CAREERS
  • RESOURCES
  • Let’s Talk
Select Page
  • Cybersecurity
    • Blogs
    • Policies Guidelines & Compliance
    • Webinars
    • White Papers
  • Technology Services
    • Blogs
    • Policies Guidelines & Compliance
    • White Papers
  • Remote
    • Blogs
    • Policies Guidelines & Compliance
    • White Papers
  • IT Compliance
    • Blog
    • Policies Guidelines & Compliance
    • White Papers
  • Phishing
    • Blogs
    • White Papers
  • Disaster Recovery
    • Blogs
    • Policies Guidelines & Compliance
    • White Papers
Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP)

IT Compliance, Policies Guidelines & Compliance, Policies Guidelines & Compliance, Vivitec IT Services

Acceptable Use Policy (AUP)  is to outline the acceptable use of computer equipment at your company. These rules are in place to protect the employee and your company. Inappropriate use exposes your company to risks including virus attacks, compromise of network...

read more
Email Policy

Email Policy

IT Compliance, Policies Guidelines & Compliance, Policies Guidelines & Compliance, Vivitec IT Services

The purpose of this email policy is to ensure the proper use of your company's email system and make users aware of what your company deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within...

read more
Pandemic Response Planning Policy

Pandemic Response Planning Policy

IT Compliance, Policies Guidelines & Compliance

This document directs the planning, preparation, and exercises for pandemic disease outbreak over and above the normal business continuity and disaster recovery planning process. The objective is to address the reality that pandemic events can create personnel and...

read more
Password Protection Policy

Password Protection Policy

IT Compliance, Policies Guidelines & Compliance, Policies Guidelines & Compliance, Remote Workers

The purpose of this policy is to establish a standard for strong password creation and protection.Disclaimer: This is not a legal document. The intent is to be used as sample/foundation policy for small businesses. Every company should consult with legal...

read more
Security Response Plan Policy

Security Response Plan Policy

Cybersecurity, IT Compliance, Policies Guidelines & Compliance, Policies Guidelines & Compliance

The purpose of this policy is to establish the requirement that all business units supported by your company security team develop and maintain an SRP. This ensures that the security incident management team has all the necessary information to formulate a successful...

read more
Remote Workforce Security Policy

Remote Workforce Security Policy

IT Compliance, Policies Guidelines & Compliance, Policies Guidelines & Compliance, Remote Workers

This document directs the planning, preparation, and exercises for pandemic disease outbreak over and above the normal business Working remotely is rapidly becoming a new standard operating procedure, which is why we’ve put together a list of 21 best practices to help...

read more

Client Remote Support

  • SECURITY SERVICES
  • TECHNOLOGY SERVICES
  • WHO WE ARE
  • CAREERS
  • RESOURCES
  • Let’s Talk
  • Facebook
  • LinkedIn
Kentucky Office - 859.414.6115 | 2890 Chancellor Drive Crestview Hills, KY 41017 | Ohio Office - 513.400.5725 | Florida Office - 239.315.7871 | Austin, TX Office - 512.368.9292