Policy Templates
Browse our downloads below.
Information Security
Information Security is important to protect your company's sensitive and critical data.
The purpose of this Information Security Procedure is to protect your organisation's information assets from internal or external threats, deliberate or accidental.
Read more
Cyber Security Incident Response Plan
A Response Plan defines required actions in the event of an Cyber Security Incident.
The purpose of this Cyber Security Incident Response Plan is to identify the Immediate Actions and Secondary Actions required in the event of a reported incident.
Read more
Bring Your Own Device
BYOD Policy protects the security of a company's data and IT infrastructure.
It defines rules, standards and restrictions for employees who use their own personal devices to access company systems and data.
Read more
Acceptable Use
An Acceptable Use Policy establishes a culture of openness, trust and integrity.
The purpose of an AUP is to protect the organisation and all its users from potential misuse, to ensure security, and promote responsible behaviour.
Read more
Employee Vetting Protocol
Employee Vetting Protocol evaluates and screens potential and current employees.
An effective Employee Vetting Policy forms a critical part of your company's risk management strategy, ensuring you employ only qualified and trustworthy staff.
Read more
Data Protection Policy
A Data Protection Policy safeguards personal data and company integrity.
Data Protection Policy details how a company collects, uses, stores and protects data to safeguard from breaches and misuse.
Read more
Acceptable Encryption
An Acceptable Encryption Policy details your company accepted encryption techniques.
An effective Acceptable Encryption Policy is essential for maintaining the confidentiality, integrity, and security of an organisation's sensitive data.
Read more