Tech Policies

See All Topics
Join us for a discussion on migrating from Google Analytics (GA) to Google Analytics 4 (GA4). We discuss the technical aspects of the move, how to set up GA4, thoughts on saving GA data, and more.  
Continuing our AI for Legal Aid series, this session delved further into the ethical implications of AI and how legal aid organizations can develop responsible use guidelines and best practices. Attendees received a model AI usage guidelines that they can customize for their organization. The webinar was held on April 16th, 2024 at 3 pm EDT.
Join us for this session on Intune and Mobile Device Management (MDM). The webinar was held on Zoom on October 17th, 2023 at 3:00 pm Eastern.
Join us for a webinar to discuss the ethics of AI with speakers Ellen Samuel and Shellie Reid of LSNTAP.  The webinar was held on Zoom on December 19th, 2023 at 3 pm Eastern.
Join us for this webinar on Bring Your Own Device. policies and considerations  Our guest speaker was Eli Mattern of Community Legal Services. The webinar was held on October 24, 2023 at 3 pm EDT on Zoom.
Join LSNTAP for a webinar in our managing technology every day series as we discuss Choosing Software. The webinar was held on Zoom Tuesday, July 18th, 2023 at 2 pm EDT. Speakers for the session included J.
This sample Cyber Incident Response Policy provides a clear framework for organizations to effectively manage and respond to cybersecurity incidents. Designed with practical steps and timelines, it outlines key responsibilities for staff, leadership, and external partners in addressing data breaches, system vulnerabilities, and compliance requirements. By following this policy, organizations can minimize damage, ensure regulatory compliance, and improve their overall security posture.
The attached policies are starting points in developing mobile device policies for your organization.  Make sure to periodically check back as we are continuously striving to update and make more resources available.
Technology policies, like the ones provided below, serve as essential guidelines for organizations to manage the responsible and secure use of IT resources. These policies address key areas such as data security, employee responsibilities, privacy considerations, and the use of personal devices for business purposes. By implementing and adhering to such policies, organizations can safeguard sensitive information, ensure compliance with legal and ethical standards, and maintain operational efficiency.
This is a template to get organizations started on drafting an Incident Response Policy.  It includes important questions that must be discussed within the organization to prepare for a cyber security incident.

Our Partners