Categories
Information Technology
Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.
- Template
Customer Experience Programme V3
A structured assessment template designed for monitoring and improving customer experience programs in technical service delivery. The template covers engineer performance tracking, health and safety compliance, quality of work assessment, technical evaluations, and customer satisfaction ratings across multiple service visits. It includes sections for documenting observations through a Stop-Start-Continue framework, coaching implementation, and goal setting. The program enables systematic follow-up actions and provides space for both engineer and ambassador feedback. This comprehensive tool helps organizations maintain service standards, ensure compliance, and drive continuous improvement in customer experience delivery.
by Rob Mastin, from the CommunityDownloads: 90+Get - Template
Pearson VUE Supplier Audit Report
Quality, Information Security and Business Continuity Management System
by Ashish Batra, from the CommunityDownloads: 90+Get - Course
Social Media Policy
How quickly we turn to social media for any thought or shareable moment has become second nature for anyone connected online. But, as easy as pressing the Post or Share button is, the impact of these activities may be broader than we think for our professional and personal lives. This course aims to help professionals navigate the digital landscape guided by a social media policy. We will discuss guidelines for managing profiles while safeguarding privacy. We will also cover responsible and ethical conduct in different situations to help you be consistently trustworthy online. (Last updated: May 2025)
by SafetyCultureGet5 LessonsDownloads: 80+ - Template
Server Room Temperature Log
The Server Room Temperature Log by SafetyCulture helps track and maintain temperatures between 50-80 degrees Farenheit in server rooms, prompting immediate action if temperatures go out of range. The template can be customized and converted between Farenheit and Celcius to suit various environments requiring temperature control.
by SafetyCultureDownloads: 80+Get - Template
Monthly ITAR Compliance Checklist
This ITAR compliance checklist can be used by compliance officers every 30 days to ensure compliance with ITAR. Use this monthly checklist to complete export or temporary import control documents and efficiently monitor ITAR-controlled items. SafetyCulture's scheduling feature enables compliance managers to easily assign monthly compliance checks, indicating exactly what time the inspections should start and finish.
by SafetyCultureDownloads: 80+Get - Template
Product Requirements Document Template
Use this product requirements document (PRD) template as the starting point for cross-functional team meetings. Lead product managers can empower individuals within teams to take product ownership by giving them editing access. This one-page PRD template has 5 sections: 1) Important Information - participants, status, target release 2) Goals, Business Objectives, Strategic Fit - problem the product is solving, rationale for the product, technical, business. or user assumptions, research and data 3) User Stories - description, priority level, additional links and screenshots 4) User Design & Interactions - description, photo or sketch of mockup 5) Questions, Clarifications, Scope - final decision, learnings, limitations
by SafetyCultureDownloads: 80+Get - Template
Cyber Security Awareness Test
This document presents a comprehensive cyber security awareness test designed to evaluate and educate employees on essential digital security practices. The test covers crucial areas including device security, password management, network safety, and phishing awareness. It provides guidance on protecting both personal and company-issued devices, proper handling of sensitive information, and best practices for maintaining cyber security in the workplace. Key topics include password protection, security updates, safe network usage, proper device management, and recognition of potential cyber threats. The test aims to establish and reinforce fundamental security protocols that help prevent data breaches and protect organizational assets.
by Casey Thibodaux, from the CommunityDownloads: 80+Get - Template
ISO 27001 Software Development
This ISO 27001 Software Development checklist supports secure SDLC practices. It covers separate dev and prod environments, access and change management, code review, version control, test data selection, penetration testing cadence, and decommissioning. It also prompts creation of key SDLC artifacts including SOPs, System Security Plans, Security Risk Assessments, user guides, release and training plans. Use it to document compliance, reduce risk, and prepare for audits.
by Taranpreet Kaur, from the CommunityDownloads: 70+Get - Template
Small Switch or Router Photo Audit-CSD28468 v1
This detailed guide outlines the mandatory requirements for documenting network rack installations through photographs. It covers six essential sections: rack installation, rack earthing, power APDP setup, switch/router installation, cabling management, and labeling standards. Each section provides specific criteria for photo documentation, ensuring compliance with technical specifications and industry standards. The guide emphasizes proper installation techniques, safety measures, and quality assurance requirements, including correct positioning, earthing connections, power distribution, cable management, and clear labeling practices. This documentation is crucial for project completion verification and maintaining installation quality standards across network infrastructure deployments.
by Edward Hu, from the CommunityDownloads: 70+Get - Template
Liste de contrôle de la conformité RGPD
Cette liste de contrôle de conformité au GDPR (Accord sur le traitement des données) a été convertie à l'aide de iAuditor. Effectuer un contrôle de conformité peut vous aider à atténuer l'exposition aux pénalités réglementaires. Utilisez cette liste de contrôle comme guide pour vous conformer à la réglementation de base du GDPR GDPR (Accord sur le traitement des données).
by SafetyCultureDownloads: 60+Get - Template
User Requirements Document Template
Download this user requirements document (URD) template to define requirements effectively. Share this digital URD template with the product and engineering teams for better collaboration. Follow the steps below to get started on your requirements document template: 1) List down your assumptions about the proposed feature 2) Determine if the proposed feature meets the business need or solves the problem 3) Establish who is responsible for delivering the inputs for the feature 4) Go through how the feature would be used in multiple scenarios
by SafetyCultureDownloads: 60+Get - Template
Data Governance Checklist
This data governance checklist is a structured tool comprising a series of questions or tasks designed to assess and guide the implementation of data governance practices within an organization, ensuring compliance, data quality, and effective management of data assets.
by SafetyCultureDownloads: 60+Get - Course
Défendre les droits humains à l'ère de l'intelligence artificielle
Que vous ayez utilisé les médias sociaux, une application de navigation ou un filtre pour photos, il y a de fortes chances que l'intelligence artificielle (IA) ait eu un impact sur vous. Il n'y a pas que vous - l'IA a un impact sur les droits de l'homme dans le monde entier, et ce cours vous informera et vous éduquera sur la façon dont vos droits sont affectés par l'IA, et comment vous pouvez être habilité à protéger ces droits. Le 3 septembre, l'UNESCO et l'UNITAR ont lancé conjointement un nouveau cours de formation en ligne sur l'IA et les droits de l'homme. Des experts y décomposent les concepts complexes de l'IA à travers des activités simples qui s'appuient sur nos interactions technologiques quotidiennes. Le cours se concentre sur l'influence de l'IA sur la liberté d'expression, le droit à la vie privée et le droit à l'égalité.
by UNESCOGet9 LessonsDownloads: 60+ - Course
Voice Activated Personal Assistants (VAPA's)
This micro-learning module is an introduction to VAPA's and will provide you with a basic understand surrounding the acceptance and application of VAPA's in Education.
by SafetyCultureGet3 LessonsDownloads: 60+ - Template
Liste de contrôle d'audit sécurité
Une liste de contrôle d'audit de la sécurité du réseau est utilisée pour évaluer de manière proactive la sécurité et l'intégrité des réseaux organisationnels. Les responsables informatiques et les équipes chargées de la sécurité des réseaux peuvent utiliser cette liste de contrôle numérisée pour aider à découvrir les menaces en vérifiant les éléments suivants : pare-feu, ordinateurs et appareils réseau, comptes d'utilisateurs, logiciels malveillants, logiciels et autres protocoles de sécurité réseau.
by SafetyCultureDownloads: 60+Get - Template
Lista de comprobación de ciberseguridad
Una lista de verificación de seguridad cibernética ayuda a evaluar y registrar el estado de los controles de seguridad cibernética dentro de la organización. Lo utilizan los profesionales de TI para proteger el lugar de trabajo y prevenir cualquier amenaza que pueda ocurrir y obstaculizar las operaciones.
by SafetyCultureDownloads: 60+Get
