Policy Templates

Useful resources to help you overcome IT challenges affecting your business.

Browse our downloads below.

Image

Information Security


Information Security is important to protect your company's sensitive and critical data.

The purpose of this Information Security Procedure is to protect your organisation's information assets from internal or external threats, deliberate or accidental.

Read more
Image

Cyber Security Incident Response Plan


A Response Plan defines required actions in the event of an Cyber Security Incident.

The purpose of this Cyber Security Incident Response Plan is to identify the Immediate Actions and Secondary Actions required in the event of a reported incident.

Read more
Image

Bring Your Own Device


BYOD Policy protects the security of a company's data and IT infrastructure.

It defines rules, standards and restrictions for employees who use their own personal devices to access company systems and data.

Read more
Image

Acceptable Use


An Acceptable Use Policy establishes a culture of openness, trust and integrity.

The purpose of an AUP is to protect the organisation and all its users from potential misuse, to ensure security, and promote responsible behaviour.

Read more
Image

Employee Vetting Protocol


Employee Vetting Protocol evaluates and screens potential and current employees.

An effective Employee Vetting Policy forms a critical part of your company's risk management strategy, ensuring you employ only qualified and trustworthy staff.

Read more
Image

Data Protection Policy


A Data Protection Policy safeguards personal data and company integrity.

Data Protection Policy details how a company collects, uses, stores and protects data to safeguard from breaches and misuse.

Read more
 
Image

Acceptable Encryption


An Acceptable Encryption Policy details your company accepted encryption techniques.

An effective Acceptable Encryption Policy is essential for maintaining the confidentiality, integrity, and security of an organisation's sensitive data.

Read more