Skip to content
SafetyCulture

Information Technology

Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.

669 results
  • Customer Experience Programme V3
    Template

    Customer Experience Programme V3

    A structured assessment template designed for monitoring and improving customer experience programs in technical service delivery. The template covers engineer performance tracking, health and safety compliance, quality of work assessment, technical evaluations, and customer satisfaction ratings across multiple service visits. It includes sections for documenting observations through a Stop-Start-Continue framework, coaching implementation, and goal setting. The program enables systematic follow-up actions and provides space for both engineer and ambassador feedback. This comprehensive tool helps organizations maintain service standards, ensure compliance, and drive continuous improvement in customer experience delivery.

    by Rob Mastin, from the Community
    Downloads: 90+
    Get
  • Pearson VUE Supplier Audit Report
    Template

    Pearson VUE Supplier Audit Report

    Quality, Information Security and Business Continuity Management System

    by Ashish Batra, from the Community
    Downloads: 90+
    Get
  • Customer Interaction Report v1.1
    Template

    Customer Interaction Report v1.1

    Customer Interaction Report

    by Jeff Ham, from the Community
    Downloads: 90+
    Get
  • Social Media Policy
    SafetyCulture logo
    Course

    Social Media Policy

    How quickly we turn to social media for any thought or shareable moment has become second nature for anyone connected online. But, as easy as pressing the Post or Share button is, the impact of these activities may be broader than we think for our professional and personal lives. This course aims to help professionals navigate the digital landscape guided by a social media policy. We will discuss guidelines for managing profiles while safeguarding privacy. We will also cover responsible and ethical conduct in different situations to help you be consistently trustworthy online. (Last updated: May 2025)

    by SafetyCulture
    5 Lessons
    Downloads: 80+
    Get
  • Server Room Temperature Log
    SafetyCulture logo
    Template

    Server Room Temperature Log

    The Server Room Temperature Log by SafetyCulture helps track and maintain temperatures between 50-80 degrees Farenheit in server rooms, prompting immediate action if temperatures go out of range. The template can be customized and converted between Farenheit and Celcius to suit various environments requiring temperature control.

    by SafetyCulture
    Downloads: 80+
    Get
  • Monthly ITAR Compliance Checklist
    SafetyCulture logo
    Template

    Monthly ITAR Compliance Checklist

    This ITAR compliance checklist can be used by compliance officers every 30 days to ensure compliance with ITAR. Use this monthly checklist to complete export or temporary import control documents and efficiently monitor ITAR-controlled items. SafetyCulture's scheduling feature enables compliance managers to easily assign monthly compliance checks, indicating exactly what time the inspections should start and finish.

    by SafetyCulture
    Downloads: 80+
    Get
  • Product Requirements Document Template
    SafetyCulture logo
    Template

    Product Requirements Document Template

    Use this product requirements document (PRD) template as the starting point for cross-functional team meetings. Lead product managers can empower individuals within teams to take product ownership by giving them editing access. This one-page PRD template has 5 sections: 1) Important Information - participants, status, target release 2) Goals, Business Objectives, Strategic Fit - problem the product is solving, rationale for the product, technical, business. or user assumptions, research and data 3) User Stories - description, priority level, additional links and screenshots 4) User Design & Interactions - description, photo or sketch of mockup 5) Questions, Clarifications, Scope - final decision, learnings, limitations

    by SafetyCulture
    Downloads: 80+
    Get
  • ISG technology Job sheet Template
    Template

    ISG technology Job sheet Template

    Standard Template for Job sheets

    by Andrew Webb, from the Community
    Downloads: 80+
    Get
  • AV Onsite Survey
    Template

    AV Onsite Survey

    AV Onsite survey

    by David Hewlett, from the Community
    Downloads: 80+
    Get
  • DPI Field Service Report
    Template

    DPI Field Service Report

    Data Projections Inc.

    by William Birchett, from the Community
    Downloads: 80+
    Get
  • Data Integrity Audit
    Template

    Data Integrity Audit

    Data Integrity Checklist.

    by Joan Garcia, from the Community
    Downloads: 80+
    Get
  • Cyber Security Awareness Test
    Template

    Cyber Security Awareness Test

    This document presents a comprehensive cyber security awareness test designed to evaluate and educate employees on essential digital security practices. The test covers crucial areas including device security, password management, network safety, and phishing awareness. It provides guidance on protecting both personal and company-issued devices, proper handling of sensitive information, and best practices for maintaining cyber security in the workplace. Key topics include password protection, security updates, safe network usage, proper device management, and recognition of potential cyber threats. The test aims to establish and reinforce fundamental security protocols that help prevent data breaches and protect organizational assets.

    by Casey Thibodaux, from the Community
    Downloads: 80+
    Get
  • Sky uk Prof of understanding Risk Assessment
    by Jason White, from the Community
    Downloads: 70+
    Get
  • ISO 27001 Software Development
    Template

    ISO 27001 Software Development

    This ISO 27001 Software Development checklist supports secure SDLC practices. It covers separate dev and prod environments, access and change management, code review, version control, test data selection, penetration testing cadence, and decommissioning. It also prompts creation of key SDLC artifacts including SOPs, System Security Plans, Security Risk Assessments, user guides, release and training plans. Use it to document compliance, reduce risk, and prepare for audits.

    by Taranpreet Kaur, from the Community
    Downloads: 70+
    Get
  • Small Switch or Router Photo Audit-CSD28468 v1
    Template

    Small Switch or Router Photo Audit-CSD28468 v1

    This detailed guide outlines the mandatory requirements for documenting network rack installations through photographs. It covers six essential sections: rack installation, rack earthing, power APDP setup, switch/router installation, cabling management, and labeling standards. Each section provides specific criteria for photo documentation, ensuring compliance with technical specifications and industry standards. The guide emphasizes proper installation techniques, safety measures, and quality assurance requirements, including correct positioning, earthing connections, power distribution, cable management, and clear labeling practices. This documentation is crucial for project completion verification and maintaining installation quality standards across network infrastructure deployments.

    by Edward Hu, from the Community
    Downloads: 70+
    Get
  • Mtto. Equipo De Ti Corporativo Sk Em Cos.
    Template

    Mtto. Equipo De Ti Corporativo Sk Em Cos.

    Mantenimientos Equipos De Ti Corporativo Sk Em Cos

    by Jose Maria Chavez, from the Community
    Downloads: 70+
    Get
  • SKY CLOUD WIFI SITE SURVEY - FOUR AP's
    Template

    SKY CLOUD WIFI SITE SURVEY - FOUR AP's

    BSkyB Cloud Business Sites Survey

    by Adam Mrozinski, from the Community
    Downloads: 70+
    Get
  • Liste de contrôle de la conformité RGPD
    SafetyCulture logo
    Template

    Liste de contrôle de la conformité RGPD

    Cette liste de contrôle de conformité au GDPR (Accord sur le traitement des données) a été convertie à l'aide de iAuditor. Effectuer un contrôle de conformité peut vous aider à atténuer l'exposition aux pénalités réglementaires. Utilisez cette liste de contrôle comme guide pour vous conformer à la réglementation de base du GDPR GDPR (Accord sur le traitement des données).

    by SafetyCulture
    Downloads: 60+
    Get
  • User Requirements Document Template
    SafetyCulture logo
    Template

    User Requirements Document Template

    Download this user requirements document (URD) template to define requirements effectively. Share this digital URD template with the product and engineering teams for better collaboration. Follow the steps below to get started on your requirements document template: 1) List down your assumptions about the proposed feature 2) Determine if the proposed feature meets the business need or solves the problem 3) Establish who is responsible for delivering the inputs for the feature 4) Go through how the feature would be used in multiple scenarios

    by SafetyCulture
    Downloads: 60+
    Get
  • Data Governance Checklist
    SafetyCulture logo
    Template

    Data Governance Checklist

    This data governance checklist is a structured tool comprising a series of questions or tasks designed to assess and guide the implementation of data governance practices within an organization, ensuring compliance, data quality, and effective management of data assets.

    by SafetyCulture
    Downloads: 60+
    Get
  • Défendre les droits humains à l'ère de l'intelligence artificielle
    UNESCO logo
    Course

    Défendre les droits humains à l'ère de l'intelligence artificielle

    Que vous ayez utilisé les médias sociaux, une application de navigation ou un filtre pour photos, il y a de fortes chances que l'intelligence artificielle (IA) ait eu un impact sur vous. Il n'y a pas que vous - l'IA a un impact sur les droits de l'homme dans le monde entier, et ce cours vous informera et vous éduquera sur la façon dont vos droits sont affectés par l'IA, et comment vous pouvez être habilité à protéger ces droits. Le 3 septembre, l'UNESCO et l'UNITAR ont lancé conjointement un nouveau cours de formation en ligne sur l'IA et les droits de l'homme. Des experts y décomposent les concepts complexes de l'IA à travers des activités simples qui s'appuient sur nos interactions technologiques quotidiennes. Le cours se concentre sur l'influence de l'IA sur la liberté d'expression, le droit à la vie privée et le droit à l'égalité.

    by UNESCO
    9 Lessons
    Downloads: 60+
    Get
  • Voice Activated Personal Assistants (VAPA's)
    SafetyCulture logo
    Course

    Voice Activated Personal Assistants (VAPA's)

    This micro-learning module is an introduction to VAPA's and will provide you with a basic understand surrounding the acceptance and application of VAPA's in Education.

    by SafetyCulture
    3 Lessons
    Downloads: 60+
    Get
  • Liste de contrôle d'audit sécurité
    SafetyCulture logo
    Template

    Liste de contrôle d'audit sécurité

    Une liste de contrôle d'audit de la sécurité du réseau est utilisée pour évaluer de manière proactive la sécurité et l'intégrité des réseaux organisationnels. Les responsables informatiques et les équipes chargées de la sécurité des réseaux peuvent utiliser cette liste de contrôle numérisée pour aider à découvrir les menaces en vérifiant les éléments suivants : pare-feu, ordinateurs et appareils réseau, comptes d'utilisateurs, logiciels malveillants, logiciels et autres protocoles de sécurité réseau.

    by SafetyCulture
    Downloads: 60+
    Get
  • Lista de comprobación de ciberseguridad
    SafetyCulture logo
    Template

    Lista de comprobación de ciberseguridad

    Una lista de verificación de seguridad cibernética ayuda a evaluar y registrar el estado de los controles de seguridad cibernética dentro de la organización. Lo utilizan los profesionales de TI para proteger el lugar de trabajo y prevenir cualquier amenaza que pueda ocurrir y obstaculizar las operaciones.

    by SafetyCulture
    Downloads: 60+
    Get