it Governance

IT Governance Starter Kit


A Simple Approach to Kicking off an IT Governance Program

Why make things harder than they need to be?  The IT Governance Starter Kit is ideal for a small or startup company that needs to establish a basic IT governance program.  It is a collection of Microsoft Word forms, templates and instructional documents that will help you assess and establish the crucial policies that you need to operate a secure and compliant IT organization.

In this unique approach, you will use a checklist to determine how much IT governance is in place and what gaps you need to fill. Once you establish the gaps, you will quickly fill those gaps by using the policy templates provided. Each policy template consists of a scope statement and instructions to help you define the policy.

Documents included in the toolkit:

Instructions and Overview-  This document walks you step-by-step through utilizing the templates in this kit to establish IT Governance for your organization.

Toolkit Checklist-  This checklist will help you determine how much IT governance is in place and define how much work you need to do. It will also monitor your progress.

IT Steering Committee Charter-  This document certifies that your organization believes the IT function is critical to the organization’s success. You can use this document with your IT Steering Committee to oversee and report on how IT is implemented in your organization.

Business Impact Analysis Questionnaire-  This questionnaire shines the light on critical business processes and identifies which business units, operations, and processes are essential to the company’s survival. You’ll use this information as a first step in business continuity and disaster recovery planning.

Self-audit Questionnaire-  This list of questions will help you see your IT Department through the eyes of your organization’s Line-of-Business Managers as well as your auditors.

Policy Templates-  This set of policy documents are easy to read, modify, and use for your organization as explained in the Instructions and Overview.

  • Data Security Policy
  • Wireless Devices Security Policy
  • Email Security Policy
  • Internet Usage Policy
  • Remote System Access Policy
  • Network Security Policy
  • Malware Policy
  • Computer Equipment Security Policy
  • Application Development Policy
  • Password Management Policy
  • Physical Access Policy
  • Roles and Responsibilities Policy
  • Acceptable Encryption Policy

An Exceptional Value!

Recreating the templates in this kit could take you many hours (even weeks) to complete. You and your organization can benefit from all the research, advice and tools in this kit for one low price.  Order yours risk-free today!