This toolkit provides a wide variety of resources to boost your understanding and ability to implement Ism in your organization with 30 ready-to-use resources.
This toolkit is designed to provide a guiding hand to assist you in improving your knowledge and understanding of Ism by offering easy to use templates, blueprints, and documents that can be adapted to your organization’s requirements.
Buy with confidence, the Ism toolkit has a 100% Satisfaction Guarantee & Free Returns.
List Price $176.79 Get it now for just $99.0 ! Save $77.79 (44%)
Put together by The Art of Service’s industry experts and providing ready to use documents, this valuable kit takes the reader beyond the theoretical to focus on the real benefits and deliverables of Ism and how to apply them successfully within an organization.
This innovative set of documents and ready-to-use templates will provide you with a head start for both learning and applying of a Ism approach that meets today’s standards. It is tailor-fit for professionals who don’t have the time or resources at hand to develop the required templates and structure for implementation.
The Complete Ism Toolkit Includes the following 30 resources:
1.File: 01 Understanding Data Analytics and Mining.ppt – Summary: The presentations found within the Toolkit provide education about the different facets of Data Warehousing and Data Analysis: they can be used for self-edification or as the foundation for presenting a case to different levels of the organization. Wordcount: 867
2.File: 02 Data Warehouse Development Process.doc – Summary: One simple way of identifying what data objects are of most concern in your organization is to identify the subject of any existing or potential lists in the organization, such as a client list, a supplier list, an employee list, etc. Wordcount: 4712
3.File: Charging Policies.doc – Summary: IT needs to work with the business to help it reduce its cost of IT and be capable of adapting to any changes in IT usage which the business may make as a result of charging. Wordcount: 1063
4.File: Project Initiation.doc – Summary: This section summarizes any constraints that affect the scope of your project or how you carry out the project, e.g., project staff are only available during summer vacation, new system must interface with another system, requirements for external bodies affect the extent to which you can alter a process, etc. Wordcount: 1959
5.File: Working with Data in the Cloud.docx – Summary: While there may be other issues than cost, such as privacy or portability, which discourage the use of public clouds, the benefits shown through these characteristics will often support the development of a private cloud within the organization’s control. Wordcount: 3664
6.File: 02 Service Management Plan.doc – Summary: It is necessary to identify the service management processes developed to support service delivery, their purposes, and how they relate to each other and the other components (policies, tools, and controls) of the service management system. Wordcount: 2056
7.File: 03 Business and IT Service Mapping.doc – Summary: List the important activities and/or events that occur as part of the alternative path for this process, beginning with a note on where the alternative path breaks off from the standard path, and ending with a note on where the alternative path rejoins the standard path, if it does. Wordcount: 2460
8.File: Building a Business Case.doc – Summary: For example, benefits like �improved customer satisfaction’ or �enhanced market image’ or �better employee morale’ also have value, but are harder to quantify than tangible benefits such as X% less incidents, so may be omitted as being somehow not quite �real’. Wordcount: 3630
9.File: 01 Documenting Roles.doc – Summary: While a role may be specific to a single process, in delivering services to the customer, several processes may be in effect: effective role development ensures that people performing a specific role for different processes are not conflicting, even when a person is fulfilling two process roles simultaneously. Wordcount: 2112
10.File: 07 Organizational Behavior Survey.doc – Summary: If there is only a small difference between three or four scores, then this indicates that you have no clear perception of the way your organization behaves, or the organization’s behavior is highly variable. Wordcount: 1564
11.File: 09 Organizational Change.doc – Summary: To ensure that motivation is retained, changes are accepted and the program stays on track to reach the desired long-term goals, those responsible for the change should plan for and target a range of goals, including short-term, medium-term and long-term wins. Wordcount: 2199
12.File: 14 Topgrading.doc – Summary: Despite the complexities of employment law, the answer is to focus on the fundamentals: (1) perform thorough job analysis; (2) write job descriptions with behavioral competencies; (3) use nondiscriminatory language in employment applications, topgrading forms and guides, job advertisements and interviews; (4) use legally sound job offer letters; (5) avoid negligent hiring and retention claims; (6) use safe managing and firing practices; and (7) follow guidelines on how to topgrade outside the United States. Wordcount: 5339
13.File: Develop your leadership skills.doc – Summary: Thirdly, individuals bring into the group their own needs�not just the physical ones for food and shelter (which are largely catered for by the payment of wages these days) but also the psychological ones: recognition; a sense of doing something worthwhile; status; and the deeper needs to give to and receive from other people in a working situation. Wordcount: 7764
14.File: 09 Incident Log.doc – Summary: As a customer, you can use the document AS IS, or modify the document to align with the goals, objectives, and guiding principles of your organization. Wordcount: 1061
15.File: 02 Risk Management Framework.doc – Summary: Whilst the numeric rating scale should be applied consistently for each activity or project evaluated, the detailed descriptions contained in the table is provided as an example only and will need to be altered to suit the specific activity being assessed. Wordcount: 4040
16.File: Management of Risk Framework M_O_R.doc – Summary: Communication: having the appropriate communication activities in place to ensure that everyone is kept up-to-date with changes in threats, opportunities and any other aspects of risk management. Wordcount: 347
17.File: 01 Information Security Policy.doc – Summary: Contractual Documentation Preparing Terms and Conditions of Employment Using Non-Disclosure Agreements (Staff and Third Party) Misuse of Organization Stationery Lending Keys to Secure Areas to Others Lending Money to Work Colleagues Complying with Information Security Policy Establishing Ownership of Intellectual Property Rights Employing/Contracting New Staff Contracting with External Suppliers/other Service Providers Employees’ Responsibility to Protect Confidentiality of Data Confidential Personnel Data Respecting Privacy in the Workplace Handling Confidential Employee Information Giving References on Staff Checking Staff Security Clearance Sharing Employee Information with Other Employees Sharing Personal Salary Information Personnel Information Security Responsibilities Using the Internet in an Acceptable Way Keeping Passwords/PIN Numbers Confidential Sharing Organization Information with Other Employees Signing for the Delivery of Goods Signing for Work done by Third Parties Ordering Goods and Services Verifying Financial Claims and Invoices Approving and Authorization of Expenditure Responding to Telephone Enquiries Sharing Confidential Information with Family Members Gossiping and Disclosing Information Spreading Information through the Office �Grape Vine’ Using E-Mail and Postal Mail Facilities for Personal Reasons Using Telephone Systems for Personal Reasons Using the Organization’s Mobile Phones for Personal Use Using Organization Credit Cards Playing Games on Office Computers Using Office Computers for Personal Use HR Management Dealing with Disaffected Staff Taking Official Notes of Employee Meetings Staff Leaving Employment Handling Staff Resignations Completing Procedures for Terminating Staff or Contractors Obligations of Staff Transferring to Competitors HR Issues Other Recommending Professional Advisors Wordcount: 3245
18.File: 01D Operational Security Policy.doc – Summary: To empower you in the creation process, this document provides some background information regarding the subject area, including considerations to be addressed within the policy itself; however, this is your policy and should reflect the goals, objectives, and guiding principles of your organization. Wordcount: 2980
19.File: CRAMM.doc – Summary: The CRAMM software uses the measures of risk determined during the previous stage and compares them against the security level (a threshold level associated with each countermeasure) in order to identify if the risks are sufficiently great to justify the installation of a particular countermeasure. Wordcount: 814
20.File: 04 Project Initiation.doc – Summary: This section summarizes any constraints that affect the scope of your project or how you carry out the project, e.g. project staff is only available during summer vacation, new system must interface with another system, requirements of external bodies affect the extent to which you can alter a process etc. Wordcount: 2289
21.File: 08 Charging Policies.doc – Summary: The purpose of this document is to provide the <> with background information and considerations related to a charging policy with the intent of developing an effective policy within the service environment. Wordcount: 1754
22.File: 02 Email & Internet Usage Policy.doc – Summary: The policy is usually aimed at employees, although it can be extended to cover contractors, agency workers and other individuals who have access to its e-mail and Internet systems to ensure they are also aware of their rights and obligations when using the system. Wordcount: 1480
23.File: 02d Workplace Email and Internet Use – Employees and Employers Beware.doc – Summary: As with most things in life, a commonsense approach to this issue minimizes the risks for all involved: employees must acknowledge that their employers can and will monitor their use of these two electronic means of communication to ensure that it is not excessive, inappropriate, or illegal, and employers must make all employees aware of their policies and procedures with respect to the Internet and e-mail, reviewing employee activity or quickly taking remedial action when those policies or procedures are violated. Wordcount: 7017
24.File: Web 2.0 in KM.docx – Summary: What you will see by the end of this document is just how compatible knowledge management and Web 2.0 are, as well as how the future of knowledge management may be explored by emerging the two technologies through the use of cloud computing. Wordcount: 7837
25.File: Example Adams State College-Data Handling and Storage Policy.pdf – Summary: No primary records of any type belonging to Adams State College may be destroyed until they have met retention requirements established by ASC policies and public records law. Wordcount: 1958
26.File: 03 Developing KPIs.doc – Summary: The purpose of this document is to work you through the general creation process, but the document also serves as a template for creating your own process or procedure in your own organization. Wordcount: 1962
27.File: 01 Creating Policies.doc – Summary: If the policy has legal implications, is litigious by its nature, has personal implications for employees (such as security procedures), you will want to have your attorney review the policy before you distribute the policy further. Wordcount: 1051
28.File: 02 Implementation Plan_Project Plan.doc – Summary: Ultimately, we do want the new process to become the way things are done around here, so it may even be best not to set specific launch dates, as this will set the expectation that from the given date all issues relating to the process will disappear (not a realistic expectation). Wordcount: 1926
29.File: 01 Service Desk Technology.doc – Summary: Do you want the management tool to have the option to define and register a basic configuration and to save this separately (e.g. registration of the structure of (a part of) the IT infrastructure in a stable situation, so this can be consulted)? Wordcount: 4027
30.File: 02 Service Desk-Knowledge Management.doc – Summary: Understanding that the end user has called in several incidents with the same symptoms and steps to resolution provides the Service Desk Analyst a clue that some other cause must be addressed, which may be out of scope for incident management but not for problem management. Wordcount: 1655
This toolkit includes a variety of electronic documents that provide a head start for the implementation, education and awareness for Ism.
The kit is designed for those who need or are looking for awareness or skills, but simply don’t have time to develop the necessary templates and structure for the implementation.
The kit serves to act as a starting point. It will give you a clear path to travel. It is designed to be a valuable source of information and activities.
The Ism toolkit:
1. Contains 30 ready to use documents covering the Preparing, Planning, Designing, Implementing, Operating and Optimizing of Ism
2. Is scalable to any size and type of project or organization
3. Provides blueprints, templates and documents – ready to download and apply
4. Saves you time and budget
Buy with confidence, the Ism toolkit has a 100% Satisfaction Guarantee & Free Returns.
List Price $176.79 Get it now for just $99.0 ! Save $77.79 (44%)
Unit Price: EUR 97.12
Total: EUR 97.12
Info plus 19% sales tax/VAT to EUR 97.12: EUR 18.45
File Size: Full version: 2.4 MB
Download Time: Full version
56k: ~6 min.
DSL/Cable (1/8/16Mbit): <1 / <1 / <1 min.
Tags: ism toolkit, Wordcount, Summary, Complete Ism Toolkit, organization, Sharing Organization Information, Information Security Policy, Service Management Plan.doc, Professional Advisors Wordcount, Information Personnel Information, Information Spreading Information, Information Security Policy.doc, Sharing Employee Information, e.g. project staff, Staff Checking Staff, Confidential Employee Information, Service Providers Employees, Organization Credit Cards, alternative path, Sharing Confidential Information, Risk Management Framework.doc, Employee Meetings Staff, Employment Handling Staff, Organization Stationery Lending, Employing/Contracting New Staff, Understanding Data Analytics, background information, Project Initiation.doc, Data Warehouse Development, Ism approach, HR Management Dealing, List Price, Data Confidential Personnel, Disaffected Staff Taking, creation process, general creation process, �better employee morale, Service Desk-Knowledge Management.doc, effective role development, Operational Security Policy.doc, Service Desk Technology.doc, alternative path breaks, Data Respecting Privacy, Free Returns, Service Desk Analyst, Risk Framework M_O_R.doc, thorough job analysis, summer vacation, write job descriptions, Satisfaction Guarantee