The top 20 IT policies every organisation needs
- Dan Hawtrey

Organisations and their employees are highly dependent on technology. When the infrastructure, devices, or applications we use fail or are not running properly, the impact can be significant. The working day can even come grinding to a halt.
For technology to be running in an optimal, efficient, reliable, secure, compliant, and risk-free way every working day, there are a range of IT and technology-related policies and procedures that must be followed. These cover everything from the basic use to cybersecurity approaches to rules around AI.
In this post we’re going to explore twenty of the most important IT policies that modern businesses need. We also briefly explore some of the challenges around managing and disseminating these policies, and how policy management software can prove to be an essential investment for IT functions looking to ensure employees can access the policies they need.
Why employees need access to IT policies and procedures
It is critical that employees have easy access to IT policies for multiple reasons:
- Agreement with IT usage policies is usually a key part of the process for employee onboarding.
- Cybersecurity risks are constantly changing, so effective access to policies and related procedures and guidelines is essential to combat a high area of risk.
- IT policies, procedures and guidelines help support an employee self-service approach to answering questions and getting things done, easing the pressure on busy IT helpdesk teams.
- In the event of a crisis that impacts daily operations, there will be an IT element of the any business continuity or disaster recovery policy.
- AI is an emerging area which also has elements of risk, and following the right AI-related policies is helping to support the effective use of AI.
- Increasingly different functions and lines of business can procure their own cloud applications – but following IT processes and guidance on this can help maximise the benefits and minimise risks, ensuring new applications meet the right technical standards.
- Technology is integral to everything from smooth daily operations to driving innovation, and it is important that policies are followed to ensure technology is available and running as it should do.
- And many more!
Twenty top IT policies
Let’s explore some of the critical IT policies that every business needs. Note that there are some overlaps between some of these policies, and some need input from other business stakeholders too.
Acceptable use of technology policies
The acceptable use of technology is a common policy that spells out the do’s – but mainly the don’ts – about how employees use company-owned tech, describing the practices that must be adhered to and the procedures to follow. It will cover topics such as professional conduct, data privacy and more. Most employees will have to sign the acceptable use policy as part of their onboarding process but there may be some additional acceptable use policies which cover access to specific systems.
Cybersecurity policy
Cybersecurity is a critical area where it is essential for employees to be aware of the potential risks and spot a potential scam. A cybersecurity policy or policies might take in areas such as training and awareness, how to report an issue such as a phishing scam, procedures for what to do if there is an attack and so on. There is some crossover between a cybersecurity policy and some other policies in this list, such as the disaster recovery and data privacy policies.
Disaster recovery or business continuity policy
The disaster recovery or business continuity policy encompasses more than IT, but we’ve included it here because it encompasses a strong IT element. This will detail the plan for access to systems when a physical work location is out of action, or potentially what to do if systems are compromised because there is a cyberattack or data breach.
Bring Your Own Device (BYOD) policy
Many organisations have parts of the workforce that do not have a corporate issued mobile device, usually on the frontline. Instead, they may allow limited use of personal devices to access some information. A BYOD policy outlines guidance on the use of personal owned devices at work.
Mobile Device Management policy
The security of mobile devices is paramount, so IT functions will have a Mobile Device Management (MDM) policy which covers the protection of corporate-owned devices in terms of how they are configured and managed, access to certain apps, and what happens if a mobile gets lost. Usually, an MDM policy will reference an MDM solution, which might be able to wipe data and apps remotely, for example. An MDM policy may also cover aspects of the BYOD policy.
Access control policies
Policies which stipulate the approaches to accessing different systems are important to help support security. For example, many IT departments follow a “zero trust” approach which means access to systems or applications is only provided to people who strictly need it. An access control policy will outline approaches but then the processes for requesting and gaining access.
Password policies
Poor password management and practices can lead to data breaches and provide hackers with opportunities to steal data. A password policy will not only cover important practices for employees but also the settings in different applications such as multi-factor authentication, mandatory password formats and forcing password renewal after a certain time.
Data privacy policy
A robust approach to data privacy and compliance is essential in order to protect the data of employees, as well as that of customers. Most organisations will have a data privacy policy that is available for external use that stipulates approaches to data privacy and data management. Sometimes a legal team will craft this policy, although there will be a need for IT input. There will also be data privacy policies for internal use (which may also be covered in information security and acceptable use policies) that cover data usage and handling and are very specific in terms of processes to follow.
Information security policy
An information security policy will detail how information is handled, managed, stored, and transmitted, and helps to protect information assets. It ensures people without authorised access cannot access sensitive and confidential information. For example, an information security policy might establish different levels of security for information from “public” to “confidential” which then dictates areas such as access, where the information resides, management processes and so on.
Data retention policy
How long does an organisation need to retain its data? And how is older data stored and accessed? A range of legal and regulatory considerations, as well as any business requirements to access data and other practical considerations, will define the data retention policy for the organisation.
Data back-up policy
This policy provides information on how often data is backed up in order to minimise damage and disruption in the case of an outage or incident, as well as ticking boxes relating to compliance.
Remote access and related remote work policies
Most organisations operate hybrid and remote working. Remote access policies provide the detail of how to access key systems from outside the firewall and cover areas such as VPN use. There will be a range of other remote work policies too, some of which will relate to technology use and security.
Equipment and device ordering policy
How do I order a new mouse? What mobile devices are on offer? Can I upgrade my laptop? These are all common questions employees ask. Detailing the policies and the procedures relating to equipment and device ordering and ensuring these are easily found on a self-serve basis helps streamline equipment ordering.
What tool to use when policy
The “what tool to use when” policy guides employees to which application to use for which scenario. This is usually more of a guideline than a policy and not every business actually has one in place, but they should do. The digital workplace landscape can be overwhelming for users with overlapping functionality. The “what tool to use when” policy helps drive the best use of applications and underpins a good digital employee experience.
Standards for new vendors and suppliers
It is very easy for different teams and lines of business to procure their own cloud-based applications. But any new application or vendor supplying it must meet particular standards to ensure security, compliance, compatibility with the rest of the technical stack, efficiency, support, and long-term viability. Policies that stipulate the technical standards for new vendors as well as the process of how these will be reviewed are an essential component of effective procurement and help to preserve technical standards and a good digital employee experience.
IT processes for onboarding new employees
When a new employee starts in an organisation there are a number of processes that IT teams need to carry out including setting them up as a user, providing them with the right devices, setting them up with access to systems, putting them in the right Microsoft 365 groups and so on. The IT-related process for onboarding new employees is an important procedure which guides what the IT team, the line manager of the new hire, HR, and the new starter themselves have to do for a successful onboarding process.
Network security policy
Security is always a top priority for IT teams. The network security policy will gather a range of policies and procedures to ensure that the network infrastructure remains highly secure. In practice this will incorporate some of the other specific policies in this list such as the access control policy.
AI use and governance policy
Most organisations are actively using AI to transform their productivity, but this is still an area which is fast evolving, and which also comes with potential risks. Policies which cover AI use and governance provide the essential guardrails to ensure AI is used in the best possible way, giving employees confidence and reducing the chance of issues and incidents occurring.
Application-specific policies
There can also be a range of platform or application-specific policies around use and access to follow. For example, this could relate to specific parts of the Microsoft 365 suite that cannot be used, or whether external users can be invited to a Teams space, or how Salesforce is rolled out.
Environmental policies
At the moment not every IT function has policies about limiting the carbon footprint of their technology operation, but as the climate crisis continues to grow, we think this will become more important. It can stipulate the aims to reduce emissions, the preferred credentials of suppliers and also any reporting.
What are some of the challenges with managing IT policies?
Policy management is particularly important for support functions such as IT who frequently set policies and procedures that employees must follow in order to minimise risk, drive efficiency, standardise approaches and underpin operations. But there are challenges in ensuring policies are:
All of the above can be particular challenges for IT functions with distinct and very busy teams with quite different roles, and where policies need to change frequently.
How can a policy management solution like Xoralia help?
Many organisations choose to invest in a policy management solution that can do much of the heavy lifting around policy management and overcome some of the associated challenges. Xoralia also has the extra advantage of seamless integration with SharePoint, with all data stored in your Microsoft 365 tenant, ticking all the security and compliance boxes for IT teams.
Xoralia’s features include:
Managing your IT policies
Effective management of your IT policies is important – benefiting busy IT teams, supporting users, minimising risk and more. Why not book a free demo of Xoralia to see first hand how it can support IT policy management?
The story behind Xoralia
Xoralia was built by the team at Content Formula, an intranet and digital workplace consultancy that has built SharePoint intranets for some of the world’s most famous companies. Now, most companies want their policies and procedures on the intranet but they don’t just want to store them there, they also want tools to help better manage them. Over the years we came across just about every single requirement for a policy management system. As this article above explains, there are gaps in SharePoint and so we never built what in our mind was the perfect policy management system.
However, one of our clients challenged us to build something for them that filled all the gaps but still used SharePoint at the back end. We had a great relationship with them and agreed to share the budget to do this, provided we could then market the solution to others. That was in 2019. We’re now on version 3 of Xoralia and the product has grown and evolved a lot.
3 benefits you can expect from Xoralia
Make it easy to find policies
Centralised policy library with powerful search and filtering.
Reduce administrative burden
Automations and notifications so that all policy tasks are carried out on time
Demonstrate compliance and best practice
Sophisticated tracking and dashboards to drive and measure compliance.
And lots more!
What our clients say

AppSource review
A great time saver and tool for document management

Tim Galer
IT Coordinator
Hughes
Ideal partner for our regulated environment

Adam Lythgoe
IT Manager
LifeArc
How to get started with Xoralia
Step 1: request a demo
Fill out our form and we will be in touch to arrange a time. You can even book a time yourself.
Step 2: get a price proposal
If you think Xoralia is for you ask us for a quote. This will set out any options you may have.
Step 3: install and launch
We’ll install Xoralia in your environment (or you can do it yourself). We’ll provide training and support to get you up and running quickly.
Here's what you'll get
-
Central policy library
-
Search and filter tools
-
Mandatory read policies with attestations
-
Quizzes
-
Notifications and alerts
-
Employee dashboard
-
Line manager dashboard
-
Works on mobile, in Teams and SharePoint
-
New policy creation workflows
-
Policy update workflows
-
Review and approval gates
-
Policy version history
-
Compliance dashboard
-
Audit trail
-
Full reporting
And last but not least:
-
Professional implementation service and support
-
Evergreen software – frequent updates and improvements
-
Comes with our "it just works" support warranty – we’ll fix any bugs, often before you even notice
Ready to get started?
Connect with us to streamline your policy management and ensure effortless compliance.

AppSource review
Uniting excellence in integration and features for seamless policy management

Rian Stuart
IT Manager
TwinStream
