This toolkit provides a wide variety of resources to boost your understanding and ability to manage Voi in your organization with 30 ready-to-use resources.
This toolkit is designed to provide a guiding hand to assist you in improving your knowledge and understanding of Voi by offering easy to use templates, blueprints, and documents that can be adapted to your organization’s requirements.
Buy with confidence, the Voi toolkit has a 100% Satisfaction Guarantee & Free Returns.
List Price $176.79 Get it now for just $99.0 ! Save $77.79 (44%)
Put together by The Art of Service’s industry experts and providing ready to use documents, this valuable kit takes the reader beyond the theoretical to focus on the real benefits and deliverables of Voi and how to apply them successfully within an organization.
This innovative set of documents and ready-to-use templates will provide you with a head start for both learning and applying of a Voi approach that meets today’s standards. It is tailor-fit for professionals who don’t have the time or resources at hand to develop the required templates and structure for implementation or management.
The Complete Voi Toolkit Includes the following 30 resources:
1.File: Availability Requirements.doc – Summary: Use this section to describe any and all information that needs to be supplied with regard to serviceability of the Service and its components. Wordcount: 1252
2.File: Security Service Requirement.doc – Summary: Scope for the requirements document may be determined by the business, therefore covering only a select few of the Services provided by the IT department that are seen as critical to the support of the business processes. Wordcount: 1216
3.File: Technical Architecture.doc – Summary: Row_Definition=Model,Configuration Item Number,Manufacturer,District,Facility,Department,Current Status,Serial No,Description,Vendor,Networked (Y/N),Warranty Expiry Date,Availability Requirements,ISU Responsible,Division / Business Unit,Building,Level,Room #,Cost Center,Order Number,Purchase Date,Disposal Date,Installation Date,Maintenance Date,Warranty Reference,Maintenance Reference,Critical Configuration Item (Y/N),Unit,Section,Current User,Users Title,Phone,Invoice #,Purchase Price,Annual Maintenance Fee,AMF Amount,PC Levy,PC Levy Amount,Equipment Capital Injection Fee,ECI Amount,Proposed Retirement Date Wordcount: 2284
4.File: Business Continuity Strategy.doc – Summary: This recovery options is used for services where immediate restoration of business processes is not needed and can function for up to a period of 24 to 72 hours as defined in a service agreement. Wordcount: 1630
5.File: Business Plan.doc – Summary: If there is current expenditure in the P&L for activities which may become redundant or obsolete with the introduction of this new project, indicate the P&L expense code and the monthly amount. Wordcount: 1654
6.File: Charging Policies.doc – Summary: IT needs to work with the business to help it reduce its cost of IT and be capable of adapting to any changes in IT usage which the business may make as a result of charging. Wordcount: 1063
7.File: Risk Assessment Template.doc – Summary: Scope for the assessment may be determined by the business, therefore covering only a select few of the Services provided by the IT department that are seen as critical to the support of the business processes. Wordcount: 800
8.File: Service-Based SLA.doc – Summary: The service based SLA is usually preferred by IT as it allows a single document to cover a single service for all end users of that service. Wordcount: 1108
9.File: 9781486476763_txt.pdf – Summary: As you may well already be aware, a number of high-profile experts (including those who work in or alongside some very well-known companies like Microsoft, Apple, Google, etc) are anticipating an industry-wide shift toward cloud computing at some very near point in the future; meaning, cloud technologies might replace the traditional IT model entirely. Wordcount: 46407
10.File: 11 Service-Based SLA Template Example.doc – Summary: It is the process by which the service provider and customer will define and agree on the scope and outcomes of a service, as well as review the performance of the service against agreed targets. Wordcount: 2079
11.File: 12 Customer-Based SLA Template Example.doc – Summary: This document serves as a GUIDE FOR THE CREATION OF AN AGREEMENT BETWEEN THE SERVICE LEVEL MANAGEMENT PROCESS OWNER AND THE CUSTOMER OF IT SERVICES (Covering all the IT Services they use). Wordcount: 2068
12.File: Building a Business Case.doc – Summary: For example, benefits like �improved customer satisfaction’ or �enhanced market image’ or �better employee morale’ also have value, but are harder to quantify than tangible benefits such as X% less incidents, so may be omitted as being somehow not quite �real’. Wordcount: 3630
13.File: 03 Telephone Skills Standards – Service Desk.doc – Summary: While performance measures like First Call Resolution may put considerable pressure on the Service Desk to contain all communications with the end-user to between the customer and the Service Desk, there are frequent times when incidents and service requests have to be referred or escalated to a subject matter expert outside the Service Desk. Wordcount: 2556
14.File: 04 Customer Service Standards – Service Desk.doc – Summary: To empower you in the creation process, this document provides some background information regarding the subject area, including considerations to be addressed within the policy itself; however, this is your policy and should reflect the goals, objectives, and guiding principles of your organization. Wordcount: 1184
15.File: 11 Performance Management Process Checklist.doc – Summary: As part of that system, you will want to use this checklist to guide your participation in the Performance Management and Development Process. Wordcount: 2042
16.File: 13 360-Degree Feedback.doc – Summary: 360-degree feedback is a method and a tool that provides each employee the opportunity to receive performance feedback from his or her supervisor and four to eight peers, reporting staff members, coworkers and customers. Wordcount: 2278
17.File: 14 Topgrading.doc – Summary: Despite the complexities of employment law, the answer is to focus on the fundamentals: (1) perform thorough job analysis; (2) write job descriptions with behavioral competencies; (3) use nondiscriminatory language in employment applications, topgrading forms and guides, job advertisements and interviews; (4) use legally sound job offer letters; (5) avoid negligent hiring and retention claims; (6) use safe managing and firing practices; and (7) follow guidelines on how to topgrade outside the United States. Wordcount: 5339
18.File: Develop your leadership skills.doc – Summary: Thirdly, individuals bring into the group their own needs�not just the physical ones for food and shelter (which are largely catered for by the payment of wages these days) but also the psychological ones: recognition; a sense of doing something worthwhile; status; and the deeper needs to give to and receive from other people in a working situation. Wordcount: 7764
19.File: 02 Availability Requirements.doc – Summary: Use this section to describe any and all information that needs to be supplied with regards to serviceability of the Service and its components. Wordcount: 1800
20.File: 04 Business Continuity Strategy.doc – Summary: This recovery option is used for services where immediate restoration of business processes is not needed and can function for up to a period of 24 to 72 hours as defined in a service agreement. Wordcount: 1972
21.File: 02 Risk Management Framework.doc – Summary: Whilst the numeric rating scale should be applied consistently for each activity or project evaluated, the detailed descriptions contained in the table is provided as an example only and will need to be altered to suit the specific activity being assessed. Wordcount: 4040
22.File: 04 Business Impact Assessment.doc – Summary: For instance, a process and procedures document will provide background around a particular activity or deliverable, some considerations within the subject area, an example of its output, and room for the customer to create their own process, procedure, or deliverable. Wordcount: 1853
23.File: 06 Risk Assessment Questionnaire.doc – Summary: In IT service management, all the planning, design specifications, testing, and monitoring can be applied to ensure that the service can be delivered safely and effectively to the customer under known and controlled conditions; however, there is always an element of uncertainty to beware. Wordcount: 2229
24.File: 07 IT Risk assessment scoresheet.doc – Summary: Low: e.g. system/application processes data that comprises less than 20% of the Bank’s assets, liabilities, income and/or expense. Wordcount: 651
25.File: 10 Conducting a Risk Management Review.doc – Summary: These costs fall into three broad categories: (1) property, income, lives, and other things of value damaged or destroyed in accidents; (2) the deterrence effects of potential accidental losses (the net benefits that could have been gained from activities no one undertook because they were judged to "risky"), and (3) the resources devoted to managing accidental losses (resources that could have been put to alternative uses had there been no possibility of any accidental losses, no loss exposures). Wordcount: 2768
26.File: 12 Risk Assessment Template.doc – Summary: The document has been designed to support you in implementing or improving capabilities in Risk Management This section provides instructions for how to use this document properly and should be deleted before publication in your environment. Wordcount: 1194
27.File: 01 Information Security Policy.doc – Summary: Contractual Documentation Preparing Terms and Conditions of Employment Using Non-Disclosure Agreements (Staff and Third Party) Misuse of Organization Stationery Lending Keys to Secure Areas to Others Lending Money to Work Colleagues Complying with Information Security Policy Establishing Ownership of Intellectual Property Rights Employing/Contracting New Staff Contracting with External Suppliers/other Service Providers Employees’ Responsibility to Protect Confidentiality of Data Confidential Personnel Data Respecting Privacy in the Workplace Handling Confidential Employee Information Giving References on Staff Checking Staff Security Clearance Sharing Employee Information with Other Employees Sharing Personal Salary Information Personnel Information Security Responsibilities Using the Internet in an Acceptable Way Keeping Passwords/PIN Numbers Confidential Sharing Organization Information with Other Employees Signing for the Delivery of Goods Signing for Work done by Third Parties Ordering Goods and Services Verifying Financial Claims and Invoices Approving and Authorization of Expenditure Responding to Telephone Enquiries Sharing Confidential Information with Family Members Gossiping and Disclosing Information Spreading Information through the Office �Grape Vine’ Using E-Mail and Postal Mail Facilities for Personal Reasons Using Telephone Systems for Personal Reasons Using the Organization’s Mobile Phones for Personal Use Using Organization Credit Cards Playing Games on Office Computers Using Office Computers for Personal Use HR Management Dealing with Disaffected Staff Taking Official Notes of Employee Meetings Staff Leaving Employment Handling Staff Resignations Completing Procedures for Terminating Staff or Contractors Obligations of Staff Transferring to Competitors HR Issues Other Recommending Professional Advisors Wordcount: 3245
28.File: 02 Security Service Requirement.doc – Summary: The purpose of this document is to provide the <> with a structure for gathering pertinent information regarding Security Requirements.Wordcount: 1577
29.File: 03 Security Audit Template.doc – Summary: Your use of this system constitutes your further agreement that you will not use the system in any way that would violate any law, or that would be inconsistent with any Company policy or standard including policies on Ethics, Harassment, Conflict of Interest, and standards for system security. Wordcount: 3211
30.File: Building an Effective Information Security Policy.doc – Summary: There are of course various different options and points to think over here, such as do you want it to be accessible to everyone or do you want to password protect it and/or put it on a specific server port, can the contents of the external site (extranet) be seen by or published to the outside world, maintenance of systems and content, etc. so I would recommend it to keep things as simple as possible. Wordcount: 13098
This toolkit includes a variety of electronic documents that provide a head start for the implementation, management, education and awareness for Voi.
The kit is designed for those who need or are looking for awareness or skills, but simply don’t have time to develop the necessary templates and structure for the implementation.
The kit serves to act as a starting point. It will give you a clear path to travel. It is designed to be a valuable source of information and activities.
The Voi toolkit:
1. Contains 30 ready to use documents covering the Preparing, Planning, Designing, Implementing, Operating and Optimizing of Voi
2. Is scalable to any size and type of project or organization
3. Provides blueprints, templates and documents – ready to download and apply
4. Saves you time and budget
Buy with confidence, the Voi toolkit has a 100% Satisfaction Guarantee & Free Returns.
List Price $176.79 Get it now for just $99.0 ! Save $77.79 (44%)
Unit Price: EUR 97.12
Total: EUR 97.12
Info plus 19% sales tax/VAT to EUR 97.12: EUR 18.45
File Size: Full version: 2.9 MB
Download Time: Full version
56k: ~7 min.
DSL/Cable (1/8/16Mbit): <1 / <1 / <1 min.
Tags: voi toolkit, Wordcount, Summary, Security Service Requirement.doc, Complete Voi Toolkit, Information Security Policy.doc, Business Continuity Strategy.doc, SERVICE LEVEL MANAGEMENT, SLA Template Example.doc, Customer Service Standards, Retirement Date Wordcount, Voi approach, Information Personnel Information, Information Spreading Information, Service Desk, Information Security Policy, Risk Management, service agreement, Sharing Organization Information, Professional Advisors Wordcount, Service Providers Employees, risk assessment, Effective Information Security, Performance Management Process, Sharing Employee Information, Service Desk.doc, Confidential Employee Information, business processes, Sharing Confidential Information, Risk Management Framework.doc, Staff Security Clearance, Risk Management Review.doc, Business Impact Assessment.doc, service management, accidental losses, Employee Meetings Staff, Employment Handling Staff, Risk Assessment Template.doc, Risk Assessment Questionnaire.doc, Risk assessment scoresheet.doc, Employing/Contracting New Staff, List Price, single service, Telephone Skills Standards, Security Audit Template.doc, Organization Credit Cards, service requests, HR Management Dealing, Disaffected Staff Taking, �better employee morale