Skip to content
SafetyCulture

Information Technology

Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.

669 results
  • Comprehensive CCTV System Audit Checklist
    Template

    Comprehensive CCTV System Audit Checklist

    This comprehensive CCTV system audit checklist helps councils and facility teams assess the effectiveness and compliance of surveillance systems. Review system overview, security of equipment, monitoring and usability, and compatibility with platforms. Verify legal obligations including signage and footage retention. Capture NVR and DVR details, camera inventory and locations, and note operational status. Evaluate integration potential, networking back to the administration center, and estimated costs. Conclude on fitness for purpose and next steps.

    by Allan Wilson, from the Community
    Downloads: 20+
    Get
  • Evidence of Work Completed Audit Template
    Template

    Evidence of Work Completed Audit Template

    Use this TFSNZ Evidence of Work Completed audit template to record proof that a task or project has been finished. Capture customer or project lead, job number, date, preparer, work location, comments, and attach clear photos covering all areas completed. Ideal for ICT and field service teams to support handover, quality assurance, and client sign off. This checklist helps standardize documentation across jobs and provides a reliable record for compliance, billing, and warranty purposes.

    by Rowan Hill, from the Community
    Downloads: 20+
    Get
  • Gap IT Cab Rewire Project Scope and Audit
    Template

    Gap IT Cab Rewire Project Scope and Audit

    Use this IT cabinet rewire checklist to plan, execute, and audit cabling work in network racks. Capture before and after photos, confirm router activity lights, run and record ping tests for each device, verify C13 C14 and UK PDUs, confirm UPS and wall power paths, document rack shelf placement and device repositioning, complete repatching, and validate cabling and labeling. Add feedback on securing the cabinet and record additional notes. The result is a clear scope of work, change record, and handover documentation for stakeholders.

    by Shujaat Khan, from the Community
    Downloads: 20+
    Get
  • GDPR Data Breach Reporting Checklist
    Template

    GDPR Data Breach Reporting Checklist

    This GDPR data breaches checklist helps teams identify and respond to personal data incidents. Capture the department and representative, document breach details and real examples, determine who to notify, and meet the 72 hour reporting requirement. Record the information to include in a report, clarify roles and escalation paths, and understand potential fines. Use this as a training and audit aid to reinforce GDPR awareness and compliance across the organization.

    by Connor Barnett, from the Community
    Downloads: 20+
    Get
  • Computer Maintenance Checklist
    Template

    Computer Maintenance Checklist

    This Computer Maintenance Checklist helps IT professionals and managers keep computers running reliably. It covers hardware care such as cleaning peripherals, organizing and inspecting cables, and flagging parts for repair or replacement. Software tasks include operating system updates, clearing browser files, and managing startup programs. Security steps guide teams to update antivirus, run full scans, and use anti malware tools. General upkeep includes disk cleanup, defragmentation, emptying the recycle bin, uninstalling unused programs, and system reboot. The checklist also provides space for comments, recommendations, and sign off to document each maintenance session.

    by Abdallah Ndiaye, from the Community
    Downloads: 20+
    Get
  • Site Plant Check Template
    Template

    Site Plant Check Template

    This site plant check template supports routine walk arounds of a data center. It guides operators to confirm the operations office is in a workable state and that BMS and PMS show no unknown alarms. It covers LV and HV switch rooms, carrier rooms, CRAC and CRAH cooling equipment, Vesda fire detection, AHU and humidifiers, UV filter rooms, water booster sets, generator switchgear and generator rooms, UPS rooms and battery rooms, cooling galleries, and data halls. The checklist prompts for alarm status, leaks, environmental abnormalities such as smell or noise, cabinet locks, housekeeping standards, and final sign off after returning systems to normal monitoring.

    by Virtus ICT, from the Community
    Downloads: 20+
    Get
  • Hodnocení projektu a instalace
    Template

    Hodnocení projektu a instalace

    Praktická šablona pro hodnocení projektu a instalace AV/ICT včetně kontroly přípravy (PIP, PD2), průběhu realizace a kvality montáže. Pokrývá projekci, interaktivní tabule, řídicí systém, audio, teleprezenci a videokonference, kamery a vizualizéry, digital signage, připojná místa, kabeláž a rack, silnoproud, firemní standardy na pracovišti a BOZP. Obsahuje sekce pro práci subdodavatelů, zpětnou vazbu klienta a návrhy na zlepšení. Po dokončení zahrnuje dokumentaci skutečného stavu (PD3), systémový test, předávací protokol, nastavení vzdálené správy a fotodokumentaci. Vhodné pro týmy ICT a AV integrátory.

    by Tomas Volf, from the Community
    Downloads: 20+
    Get
  • Supervisión de Servicio de Sistemas
    Template

    Supervisión de Servicio de Sistemas

    Lista de verificación en español para la supervisión del servicio de sistemas en tienda. Cubre equipos de comunicación, cómputo y videovigilancia, así como calidad de energía. Incluye comprobaciones de limpieza y orden del cableado, operación de UPS y protectores, mediciones de voltaje entre 110 y 120, y validación de tierra física entre 0 y 5 ohms, con evidencia fotográfica. Añade tareas para actualizar inventarios de activos y accesorios (routers, servidores, miniprinter térmica, escáner, cajón de dinero, CCTV, UPS, monitores, switches y más) y registrar la calificación de la tienda y el estado del rack.

    by Victor Ramirez, from the Community
    Downloads: 20+
    Get
  • Cyber Security Checklist for IT Teams
    Template

    Cyber Security Checklist for IT Teams

    This cyber security checklist helps IT teams assess and record the status of key security controls across people, physical facilities, accounts and passwords, and sensitive data protection. It covers laptop and workstation security, access control, visitor management, screen locking, encryption, data retention, disposal of media, and PCI and privacy practices. It also guides disaster recovery and business continuity planning, incident communication, and regular training and awareness. Use it to audit compliance with policies and standards, identify gaps, and strengthen your organization’s security posture.

    by Omar Sherif, from the Community
    Downloads: 20+
    Get
  • Cyber Safety Checklist for End Users
    Template

    Cyber Safety Checklist for End Users

    Use this cyber safety checklist to train end users on essential security habits. Topics include recognizing phishing and scams, creating strong passwords and using MFA, safe browsing and handling pop ups, identifying secure sites with HTTPS and lock icons, understanding cookies, protecting devices with antivirus and firewalls, keeping systems updated, using VPN on untrusted networks, choosing safer online payment methods, and avoiding risks on public Wi Fi. Help reduce incidents and build a culture of cyber awareness.

    by chanchal jha, from the Community
    Downloads: 20+
    Get
  • Network Equipment Room Assessment Checklist
    Template

    Network Equipment Room Assessment Checklist

    This Network Equipment Room assessment checklist guides technicians through a thorough review of NER conditions and adjacent telecom, UPS, and fire life safety rooms. It covers room security and access controls, perimeter integrity and fire stopping, environmental checks for temperature, humidity, leaks, and lighting, and verification of cooling systems. It includes audits of fire protection, UPS backup power and alarms, equipment stability and seismic bracing, storage compliance, and housekeeping. Detailed sections evaluate racks and cabinets, grounding and bonding, wall fields, cabling practices, and documentation of a complete room drawing with dimensions, equipment locations, and safety systems. The process emphasizes photo evidence, remediation notes, and final sign off.

    by Daniel Mohs, from the Community
    Downloads: 20+
    Get
  • Access Control Service Report
    Template

    Access Control Service Report

    Use this access control service report template to document inspections and maintenance of doors, locks, readers, exit devices and safety hardware. Record door condition, lock type, reader in and out, request to exit, emergency door release, safety beams and e-stop. Verify door operation, closer performance, mounting security and card validation. Capture power supply details including voltage, current, battery size, quantity and dates, and perform charge and load tests. Log controller models such as Gallagher, Tecom and Concept, check supply voltage, hardware mounting and terminations. Add failed items, results, technician comments and sign-off to maintain secure, compliant sites.

    by Daniel McSweeney, from the Community
    Downloads: 20+
    Get
  • Dynamic Field for PL V3.1
    Template

    Dynamic Field for PL V3.1

    This public template demonstrates dynamic fields in SafetyCulture, including nested sections, smart fields, drawings, and conditional items. Use it to prototype question logic, test data capture behavior, and understand how dynamic components behave across a full inspection workflow. Ideal for learning and designing flexible checklists.

    by Aleksandr Chistiakov, from the Community
    Downloads: 20+
    Get
  • Auditoria Interna ISO 27001:2022
    Template

    Auditoria Interna ISO 27001:2022

    Este checklist de Auditoria Interna ISO 27001:2022 ajuda a avaliar a conformidade do Sistema de Gestão de Segurança da Informação. Abrange contexto da organização, liderança, planejamento, apoio, operação, avaliação de desempenho e melhoria, além dos controles do Anexo A, como gestão de acesso, identidade, incidentes, fornecedores, nuvem, criptografia, vulnerabilidades, continuidade de negócios e privacidade. Use-o para registrar constatações, não conformidades, pontos de preocupação e oportunidades de melhoria, evidências documentadas e acompanhar ações corretivas durante todo o ciclo de auditoria.

    by Fernando Manuel Cabral Fonseca, from the Community
    Downloads: 20+
    Get
  • Yapay Zeka Çağında İnsan Haklarını Savunmak
    UNESCO logo
    Course

    Yapay Zeka Çağında İnsan Haklarını Savunmak

    Sosyal medya, navigasyon uygulaması veya fotoğraf filtresi kullanırken yapay zekanın sizi etkilemiş olması mümkündür. Yapay zekadan etkilenen sadece siz değilsiniz - Yapay zeka aynı zamanda insan haklarını da dünya çapında etkiliyor ve bu kurs, haklarınızın yapay zekadan nasıl etkilendiği ve bu hakları korumak için nasıl yetkilendirilebileceğiniz konusunda sizi bilgilendirecek ve eğitecektir. UNESCO ve UNITAR ortaklığıyla, 16 ila 24 yaş arası gençler için Yapay Zeka ve İnsan Hakları üzerine yeni, kısa bir online öğrenme kursu düzenlendi. Uzmanlar, yapay zeka hakkındaki karmaşık kavramları, günlük teknolojik etkileşimlerimiz etrafında oluşturulan basit faaliyetlere ayırır. Kurs, yapay zeka kullanılarak ifade özgürlüğünün, mahremiyet ve eşitlik hakkının nasıl etkilendiğine odaklanacaktır.

    by UNESCO
    9 Lessons
    Downloads: 10+
    Get
  • Obrona praw człowieka w dobie sztucznej inteligencji
    UNESCO logo
    Course

    Obrona praw człowieka w dobie sztucznej inteligencji

    Jeśli korzystałeś_aś z mediów społecznościowych, nawigacji czy filtrów do zdjęć, istnieje prawdopodobieństwo, że sztuczna inteligencja (AI) wpłynęła na Ciebie. Co więcej, nie chodzi tylko o Ciebie - sztuczna inteligencja ma wpływ na prawa człowieka na całym świecie, a dzięki temu kursowi dowiesz i nauczysz się, w jaki sposób sztuczna inteligencja wpływa na Twoje prawa i jak możesz je chronić. UNESCO i UNITAR wspólnie uruchomiły nowy, krótki kurs edukacyjny online na temat sztucznej inteligencji i praw człowieka dla młodzieży w wieku od 16 do 24 lat. Eksperci dzielą złożone koncepcje dotyczące sztucznej inteligencji na proste działania oparte na naszych codziennych interakcjach z technologiami. Kurs koncentruje się na tym, jak sztuczna inteligencja wpływa na wolność słowa, prawo do prywatności i prawo do równości.

    by UNESCO
    9 Lessons
    Downloads: 10+
    Get
  • 在人工智能时代捍卫人权
    UNESCO logo
    Course

    在人工智能时代捍卫人权

    无论你是否使用过社交媒体, 导航应用程序或是图片过滤器, 人工智能 (AI) 都很有可能影响到你. 不仅仅是你, 人工智能正在影响全世界的人权. 本课程将给予你关于人工智能的基本知识, 让你了解你的人权如何受其影响, 以及如何赋予你保护这些权利的能力. 联合国教科文组织 (UNESCO) 和联合国训练研究所 (UNITAR) 携手为16至24岁的青年们推出了一个新的关于人工智能和人权的在线学习小课程. 专家们将关于人工智能的复杂概念分解为围绕我们日常技术互动的课程活动. 该课程侧重于使用人工智能会如何影响言论自由, 隐私权和平等权.

    by UNESCO
    9 Lessons
    Downloads: 10+
    Get
  • Захист прав людини в епоху штучного інтелекту
    UNESCO logo
    Course

    Захист прав людини в епоху штучного інтелекту

    Незалежно від того, чи користувалися ви соціальними мережами, навігаційним додатком або фільтром для фото, Штучний Інтелект (ШІ) міг вплинути на вас. Цей короткий онлайн-курс від ЮНЕСКО та ЮНІТАР для молоді 16-24 років пояснює, як ШІ впливає на свободу слова, право на приватність і рівність. Експерти простими прикладами, заснованими на щоденних технологічних взаємодіях, розкривають складні концепти ШІ. Курс дає знання та інструменти, щоб захистити ваші права у цифровому світі.

    by UNESCO
    9 Lessons
    Downloads: 10+
    Get
  • Formulario de encuesta y análisis de necesidades
    SafetyCulture logo
    Template

    Formulario de encuesta y análisis de necesidades

    Utilice esta plantilla en español para realizar una encuesta y análisis de necesidades de salas AV y espacios de reunión. Registre el tipo de sala (junta, formación, auditorio, aula), condiciones de paredes, techo y suelo, dimensiones y planos. Documente preferencias de visualización, fuentes de video, requisitos de videoconferencia (CÓDEC, compartición de contenido), sistemas de audio y micrófonos, así como puertos y conectividad (HDMI, VGA, inalámbrico). Incluye campos para componentes existentes, listas de materiales y notas de instalación, ayudando a equipos de TI/AV a planificar e integrar soluciones de forma fiable.

    by SafetyCulture
    Downloads: 10+
    Get
  • Computer Equipment Security Checklist - Loss Prevention Standards
    Aviva UK logo
    Template

    Computer Equipment Security Checklist - Loss Prevention Standards

    Certain items of computer equipment are generally considered theft-attractive and are essential to the operations of most businesses. This document provides guidance to organisations on issues to consider when implementing security arrangements for this type of equipment. Aviva is one of the largest UK insurance brands and a leading savings and retirement business with more than 320 years of heritage. Aviva Risk Management Solutions helps you to look at risks that arise in your place of work and put into action customised measures to control them.

    by Aviva UK
    Downloads: 10+
    Get
  • Odbrana ljudskih prava u doba vještačke inteligencije
    UNESCO logo
    Course

    Odbrana ljudskih prava u doba vještačke inteligencije

    Bilo da ste koristili društvene mreže, navigaciju ili filter za fotografije, velike su šanse da je umjetna inteligencija (AI) utjecala na vas. Nije samo do Vas – AI utiče na ljudska prava širom svijeta, a ovaj kurs će vas informisati i obrazovati o tome kako vještačka inteligencija utiče na vaša prava i kako možete da štitite ta prava. UNESCO i UNITAR zajednički su pokrenuli novi, kratki online kurs učenja o AI i ljudskim pravima za mlade od 16 do 24 godine. Stručnjaci razlažu složene koncepte o AI u direktne aktivnosti izgrađene na našim svakodnevnim tehnološkim interakcijama. Kurs se fokusira na uticaje AI na slobodu izražavanja, pravo na privatnost i pravo na jednakost.

    by UNESCO
    9 Lessons
    Downloads: 10+
    Get
  • Defensant els drets humans a l'era de la intelligència artificial
    UNESCO logo
    Course

    Defensant els drets humans a l'era de la intelligència artificial

    Tant si has utilitzat xarxes socials, una aplicació de navegació o un filtre d'imatge, és probable que la intelligència artificial (IA) t' hagi afectat. No ets només tu- la IA està afectant els drets humans a tot el món, i aquest curs t'informarà i et formarà sobre com la IA afecta els teus drets i com pots empoderar-te per protegir aquests drets. La UNESCO i UNITAR han creat conjuntament un nou curs d'aprenentatge en línia sobre IA i els drets humans per a joves de 16 a 24 anys. Els experts desglossen conceptes complexos sobre la IA en activitats senzilles construïdes al voltant de les nostres interaccions tecnològiques diàries. El curs se centra en com la IA afecta la llibertat d'expressió, el dret a la privadesa i el dret a la igualtat.

    by UNESCO
    9 Lessons
    Downloads: 10+
    Get
  • Liste de contrôle de la gestion des incidents
    SafetyCulture logo
    Template

    Liste de contrôle de la gestion des incidents

    Ce modèle de gestion des incidents guide chaque étape d’une réponse organisée: préparation et réponse à la menace, détection et évaluation, activation de l’équipe et du centre de crise, définition des priorités et objectifs de reprise, mise en œuvre du plan, audit et conformité. Il couvre les fonctions clés (communication, santé et sécurité, installations, finance, RH, assurance, TI, juridique, achats, dossiers, sécurité et transport) et le suivi post-incident.

    by SafetyCulture
    Downloads: 10+
    Get
  • Sensors Site Audit Template
    SafetyCulture logo
    Template

    Sensors Site Audit Template

    Plan sensor installations with this site audit template. Document power availability, Ethernet or cellular connectivity, mobile dead spots, signal strength and distances to gateways. Capture photos of proposed locations and obstacles, and record operating temperature ranges for each asset. Use the results to scope a fit-for-purpose IoT solution and receive an accurate quote.

    by SafetyCulture
    Downloads: 10+
    Get