Categories
Information Technology
Browse Information Technology (IT) templates and training courses to support cybersecurity awareness, responsible Artificial Intelligence (AI) use, and hardware and software maintenance. Help your teams stay compliant, manage IT risks, and keep systems running reliably across the workplace.
Browse Information Technology
638 results- Course
How to Use MS Teams
Microsoft Teams is a collaboration app built for hybrid work so you and your team stay informed, organized, and connected - all in one place. This course is a quick refresher and guide on how to use Microsoft Teams for your organization.
by SafetyCultureGet5 LessonsDownloads: 100+ - Course
Social Media Policy
How quickly we turn to social media for any thought or shareable moment has become second nature for anyone connected online. But, as easy as pressing the Post or Share button is, the impact of these activities may be broader than we think for our professional and personal lives. This course aims to help professionals navigate the digital landscape guided by a social media policy. We will discuss guidelines for managing profiles while safeguarding privacy. We will also cover responsible and ethical conduct in different situations to help you be consistently trustworthy online. (Last updated: May 2025)
by SafetyCultureGet5 LessonsDownloads: 100+ - Course
Cyber Fundamentals
From passwords to permissions, ransomware to regulations – this course covers the fundamentals of cyber risk management. By completing this course you will increase your awareness of the threats, mitigations and regulations which exist and will help to ensure you are better protected in the digital age. Aviva is one of the largest UK insurance brands and a leading savings and retirement business with more than 320 years of heritage. Aviva Risk Management Solutions helps you to look at risks that arise in your place of work and put into action customised measures to control them.
by Aviva UKGet12 LessonsDownloads: 100+ - Template
PCI Compliance Self-Assessment Questionnaire
Vendors eligible for PCI self-validation can use this questionnaire to perform quality assurance and safety checks regarding covering their POS and internal data security systems. Specifically, vendors can check for inadequate access controls that might allow malicious users in, ensure that default system settings and passwords were changed upon system installation, and check if sensitive data is being stored and if this is necessary, among others.
by SafetyCultureDownloads: 100+Get - Template
Business Requirements Document Template
Use this business requirements document (BRD) template for easy requirements gathering. By sharing this interactive BRD template with clients, business analysts are able to get detailed information on stakeholders and how they fit into the organization, understand the current processes and systems and how to improve them, and build strong business relationships. Follow the steps below to get started on your requirements document template: 1) Ask stakeholders about their department's key functions or the processes they perform 2) Ask stakeholders to provide screenshots of systems that support these processes 3) Add notes and edit answers for clarification or when there is a relevant update 4) Ask for the signatures of stakeholders and add your own to verify the BRD template
by SafetyCultureDownloads: 100+Get - Course
Defender os direitos humanos na Era da inteligência artificial
Se tem utilizado as redes sociais, uma aplicação de navegação ou um filtro de imagem, é provável que a Inteligência Artificial (IA) tenha tido impacto em si. Não é só consigo – a IA está a ter impacto nos direitos humanos em todo o mundo, e este curso irá informá-lo e educá-lo sobre como os seus direitos são afetados pela IA e como pode ser capacitado para proteger esses direitos. A UNESCO e a UNITAR lançaram em conjunto um novo e curto curso online de aprendizagem sobre IA e Direitos Humanos para jovens dos 16 aos 24 anos. Especialistas separam conceitos complexos sobre IA em atividades diretas construídas em torno das nossas interações tecnológicas diárias. O curso foca-se na forma como o uso da IA afeta a liberdade de expressão, o direito à privacidade e o direito à igualdade.
by UNESCOGet9 LessonsDownloads: 100+ - Course
Breakdown of Rapid Refresh (EdApp)
Learn all about EdApp's Rapid Refresh feature with this short course.
by SafetyCultureGet3 LessonsDownloads: 100+ - Template
Checklist de Auditoria Interna ISO 27001:2013
Este checklist de auditoria interna ISO 27001:2013 apoia a avaliação do Sistema de Gestão de Segurança da Informação conforme ABNT ISO/IEC 27001. Abrange contexto e partes interessadas, liderança e política, planejamento, avaliação e tratamento de riscos, recursos, competência, conscientização, comunicação e informação documentada. Inclui operação, desempenho, auditorias internas, análise crítica da direção, não conformidades e ações corretivas. Cobre controles do Anexo A (A.5 a A.18), como acesso, criptografia, segurança física, operações, comunicações e continuidade do negócio.
by Daniela Albuquerque, from the CommunityDownloads: 100+Get - Template
Sans Fil Etc Visite De Kiosque
Nouveau Rapport De Visite Pour Les Kiosque Sans Fil Etc Au Quebec
by Sebastien Perreault, from the CommunityDownloads: 100+Get - Template
NSG cyber security monthly audit
Physically/visually inspect all network access points in all areas of the store
by Eric Schmidt, from the CommunityDownloads: 100+Get - Template
Control System Software Quality Control Checklist
This control system software quality control checklist helps IT and AV teams verify code, interfaces, and device behaviors before handover. It covers inventory verification, GUI standards and usability, customer sign-off, true device feedback, dialing and phone book functions, camera presets, and source selection. Code quality checks include variable initialization and naming, removal of unused signals, inline documentation, headers, modular design, revision logs, and logic notes. Operational checks validate volume and mute initialization, privacy mute handling, shutdown/startup reliability, non-volatile storage, dialing shortcuts, secure mode handling, and final tasks like IP configuration and uploading code to the project server.
by David Ross, from the CommunityDownloads: 100+Get - Template
Score / Scoring and Weight Example - Demonstration by Eric
How to use SafetyCulture scoring function.
by Eric Ohlson, from the CommunityDownloads: 100+Get - Template
CCTV Documentation Checklist
This is to be used for the documentation of all CCTV installations done by echelon engineering
by Richard Ghartey-Wilson, from the CommunityDownloads: 100+Get - Template
ISO 50001 KPI Audit Checklist
Use this ISO 50001 KPI audit checklist to evaluate energy management performance in data centers. Review site involvement and energy meetings, confirm agreed PUE targets, and assess airflow management including hot and cold aisle configuration, containment, and blanking panels. Check cooling system efficiency, chilled water flow and return temperatures, CRAC control methodology and supply air settings. Capture average cold aisle temperatures by floor, and review electrical system efficiency including UPS performance. This template helps standardize KPI tracking and drive continual improvement under ISO 50001.
by Hitesh Jivani, from the CommunityDownloads: 100+Get - Template
Lista de comprobación de la auditoría interna ISO 27001
Esta lista de verificación se puede utilizar para evaluar la preparación de la organización para la certificación ISO 27001. Ayuda a descubrir brechas en los procesos y a revisar el SGSI de su organización según la norma ISO 27001:2013.
by SafetyCultureDownloads: 90+Get - Template
Data Protection Impact Assessment (DPIA) Template
This data protection impact assessment template is based on the sample DPIA template provided by the UK Information Commissioner's Office (ICO). Businesses handling employee health data or any other kind of special category data can use this template to do the following: 1) Identify the need for a DPIA and explain the type of processing involved, 2) Describe the nature, scope, context, and purposes of the processing, 3) Consider how to consult with relevant stakeholders, 4) Assess necessity and proportionality, 5) Describe source of risk and nature of potential impact on individuals, 6) Identify measures to reduce or eliminate risks, and 7) Record outcomes and obtain approval signatures.
by SafetyCultureDownloads: 90+Get
IT safety & quality resources teams can access on- and off-site
Discover information technology courses and checklists in SafetyCulture’s Content Library, a centralized online resource where you can browse and access a variety of ready-made instructional and inspection materials. These digital resources give you quicker access to the information you need, right when you need it.
Efficiency through digital resources
Digital access means teams can pull in the right resource at the moment it’s needed. That reduces delays, supports better decision-making, and helps teams stay aligned as systems change.
Explore how your teams can apply Content Library resources:
Stay on top of current trends with courses on cybersecurity, AI, and Microsoft Excel.
Monitor security and equipment well-being with maintenance checklists.
Prevent further escalations with incident report forms.
Everything in this library is ready to use and fully digital, so you can adapt it to your workflow and share it across your team. And when you use these resources within the SafetyCulture platform, you unlock even more value—streamlined inspections, real-time insights, and a stronger safety and quality culture on every site.
