CIO - Productivity Kit

Sarbanes-Oxley Compliant

IT and Internet Job Descriptions 
Disaster Recovery Template 
IT Service Management Template
Sensitive Information Policy - Salary Survey - Security Template 

Order Now SAVE $850 to $1,140


CIO ProductivityThe CIO productivity kit Standard edition contains

  • 243 job descriptions in MS WORD .docx format
  • Current IT Salary Survey for US and Canada (by city) PDF
  • IT Infrastructure, Strategy, and Charter Template in MS WORD .docx format
  • Disaster Recovery Template which is Sarbanes Oxley compliant in MS WORD .docx format
  • Security Template which is Sarbanes Oxley and ISO 27000 compliant in MS WORD .docx format
  • IT Service Management Template (Change Management, Help Desk, and Service Requests) in MS WORD .docx format
  • Sensitive Information Policy (Protect  Credit Card Card and Personal Information) in MS WORD .docx format

The CIO productivity kit Metric edition contains

  • Practical Guide for Cloud Outsourcing in MS WORD .docx format
  • Metrics for Internet and IT (metric kit) in MS WORD .docx format
  • Service Level Policy Agreement Policy Template (metric kit) in MS WORD .docx format

Order Now SAVE $850 to $1,140



Disaster Plan

Disaster Recovery Template (DRP) 

The Disaster Recovery Plan template (DRP) can be used for any enterprise.   DRP Template is sent to you via e-mail in WORD and/or PDF format. Included is a Business Impact Questionnaire as well as a full Job Description for the Download Disaster Recovery TemplateDisaster Recovery Manager

Order Security Manual TemplateSecurity Manual 

The plan is 178 pages and includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for your security plan.Download Security Manual Template


Order IT Job DescriptionsInternet and  IT Job Descriptions     

The 239 Internet and IT Position Descriptions are in Word for Windows format (.docx).  Includes positions from CIO and CTO to Wireless and Metrics Managers. All of the positions in the book have been created to reflect the technology world of today.Download IT Job Descriptions


Order MetricsMetrics for the Internet & IT 

The Metrics for the Internet and Information Technology HandiGuide® is over 320 pages, defines 540 objective metrics, and contains 83 metric reports that show over 240 objective metrics.Download IT Metrics


Sevice Level Agreement MetricsOrder Service Level Agreement MetricsService Level Agreement Policy Template

The Service Level Agreement Policy Template is a nine page policy for a single application,  It defines specific SLAs and metrics that are both internally and externally focused. The sample contain over 70 possible metrics presented graphically in PDF format.


Salary SurveyOrder IT Salary Survey

IT  Salary Survey

The Janco Associates, Inc. survey draws on data collected throughout the year (data as of January 2011) by extensive internet-based and completed survey forms sent to businesses throughout the United States and Canada.  Our database contains over 85,000 data points.

Free Summary Of Our Salary Survey







CIO - CTO - CSO News

BYOD policy lacking in over 50% of all organizations

November 13th, 2015

BYOD policy lacking in over 50% of all organizations

BYOD policy25% of business have have no systematic security approach for dealing with BYOD. In addition, 53% of businesses do not have a formal BYOD policy.

Mobile security best practices have been pushed by analysts and security firms for more than a decade to protect sensitive corporate data.  But how companies implement security for BYOD workers falls short.

It is clear that a growing need exists for a more robust application of security policies and procedures in modern businesses.  Janco's BYOD Policy Template is the one took that can help achieve this. 

 Download Selected Pages

- more info

Is a cloud based DR plan workable?

November 9th, 2015

Is a cloud based DR plan workable?

There are several things that need to be considered before you can answered.  Included are:

Reasons Why CIOs Recommend Outsourcing

  • Public cloud versus private cloud including all of the mandated security, privacy and confidentiality requirements.
  • Bandwidth requirements and processing speeds of the data that is to be accessed
  • Location of the cloud processing site and availability of the the cloud after the event has happened

All of these questions are answered in Janco’s How to Guide Cloud and Outsourcing

Order Cloud Outsourcing Template  Download Selected Pages

- more info

Record Management is difficult with Shadow IT

October 30th, 2015

Record Management is difficult with Shadow IT

Record ManagementCloud Application and shadow IT put organizations at risk. Many cloud-based applications, don’t have the level of security process and controls to meet mandated compliance requirements.  For example, data stored in a cloud storage application may not be secured using security best practices.  If someone uploads sensitive or confidential information to that cloud application, not only is the data vulnerable to a breach but the organization may be non-compliant with corporate governance or regulatory requirements for record management.

Record Management Policy Download Selected Pages 

- more info

Congress to create one more govt agency for security

October 19th, 2015

Security PolicyU.S. Congress (House of Representatives) is proposing that the National Highway Traffic Safety Administration set up an Automotive Cybersecurity Advisory Council to develop cybersecurity best-practices for manufacturers of cars sold in the U.S.

In addition they are looking in to requiring vehicle manufacturers to state their privacy policies, besides providing for civil penalties of up to $100,000 for the hacking of vehicles.

Order Security Manual Download Selected Pages



- more info

CIO Career Path there but not followed by many

September 24th, 2015

IT Career Path

CIO Career Path

Baby Boomers are getting ready to retire, many of them from c-level positions, leaving plenty of vacancies just waiting to be filled by the next generation.

But according to the several surveys released, no one wants the job.

1,000 human resource professionals were polled in eight countries, and found that less than half (47 percent) of respondents said that they have an adequate pool of talent to fill leadership roles in their company.

The survey also found that a frightening amount of employees are not interested in the corner office, with only 11 percent of those polled aspiring to C-level positions.

IT Job Family Classification System HandiGuide - This HandiGuide provides a step by step methodology and architecture to define job families and and align them with pay grades.

The core of Janco's IT Job Family Classification System are four (4) IT specifiic career families, broad meaningful grouping of jobs commonly clustered within a career emphasis.

To develop a functional set of classifications, the IT job family classification system provides the tools to identify the content of the task performed within a job which is the key criteria in determining the family into which a job falls. This process is how jobs are marketed in the recruiting process and conforms to how individuals and enterprises define overall career paths.

Included in the HandiGuide is a template that has been proven to work in over 100 organizations world wide. A core IT Job Family Classification is included along with operational tools to layer the levels within each of the defined job families.

Read on...


- more info

Is there a perfect password?

August 31st, 2015

Is there a perfect password?

The perfect password that is not biometric does not exist. An individual's fingerprint is one of the best passwords in the world. It's always with the individual, and no two are exactly alike. So it made perfect sense for vendors to create a simple, seamless way to use it as a password.  It has been done smartphones and many laptops.

Security Manual Template

This Security Policies and Procedures Manual for the Internet and Information Technology is over over 230 pages in length. All versions of the Security Manual template include both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address Sarbanes Oxley and CobiT compliance).   In addition, the Security Manual Template PREMIUM Edition  contains 16 detail job descriptions that apply specifically to security and Sarbanes Oxley, ISO 27000 (ISO27001 and ISO27002),CobiT, PCI-DSS, and HIPAA. Data Protection is a priority. 

Order Security Manual Download Selected Pages
- more info

Lack of BYOD policies at State Department causes havoc in presidential campaign

August 20th, 2015

Lack of BYOD policies at State Department causes havoc in presidential campaign

Lack of BYOD policies and enforcement at the State Department have caused havoc in the presidential campaign.  The secretary of state used her own personal Blackberry which was not secure.  In addition it is not clear which versions of software were on her device and wither it was backed-up  in accordance to mandated federal requirements for sensitive, confidential, and top secret information.

BYOD Policy

With the advent of Bring-Your-Own-Device - BYOD and the ever increasing mandated requirements for record retention and security, CIOs are challenged to manage in a complex and changing environment.

 Download Selected Pages

  • Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
    • Mobile Device Access and Use Policy (more info...)
    • Record Management, Retention, and Destruction Policy (more info...)
    • Social Networking Policy (more info...) Includes electronic form
    • Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
    • Travel and Off-Site Meeting Policy (more info...)

- more info

Top 10 Lists for CIOs and the IT group

August 17th, 2015

Top 10 Lists for CIOs and the IT group

  1. Top 10 most highly taxed cities – Where not to have a datacenter Top 10 most taxed cities While federal tax rates are the same no matter where the taxpayer lives, the same is not true for state...
  2. Top 10 Cities for CIO compensation  Top 10 cities where CIOs get the greatest compensation CIOs’ compensation in the 10 highest paying cities based on  Janco’s 2013 Midyear IT Salary survey...
  3. As Fortune 500 companies move from US what about IT Jobs  New IT Jobs will be in emerging markets By 2025 nearly half  – 46 percent – of all Fortune Global 500 corporations will hail from...
  4. IT Job Market Growth Slows  IT job market growth slows to 5,700 in February from 9,800 in January according to BLS data says Janco Even with the unemployment rate falling...
  5. Top 10 IT Schools Top 10 list Top 10 University rankings are always  controversial and subjective, and some wonder if the process of ranking schools is a good idea....
Order Salary Survey     Download Selected Pages


Salary Survey Job Descriptions IT Hiring Kit Interview Guide

- more info

Is Windows 10 good to go?

August 2nd, 2015

Ars Technica published Windows 10 is the best version yet - once the bugs get fixed where it says "In its current form, the operating system doesn't feel quite finished" and "... it's also buggier than Windows 8.1, 8, 7, or Vista were on their respective launch days."

To achieve these goals for Information Technology Janco has combined some of its most popular products to help CIO and IT organizations to meet the most stringent Quality Assurance and Control Standards.

Order DRPSample DRP

The Quality Assurance and Quality Control Bundle includes:

IT Service ManagementSecurity PoliciesDisaster PlanningRecord Management Policy

- more info

CIO responbilities go beyond IT

July 29th, 2015

CIO ResponsibilitiesThe CIO is responsible for overseeing the data assets of a company, from monitoring availiability to driving operational productivity, but are they taking a hard look at the vulnerabilities in their supply chains?

80% of business supply chain professionals reported that their companies experienced at least one instance of supply chain disruption in the past 12 months.

Order CIO Job Description

- more info