Policy Templates (Advanced)

Policy Template for Software Development (Waterfall)
The purpose of the Systems Development Life Cycle (SDLC) policy is to describe the requirements for developing and/or implementing software and system...
Policy Template for Vulnerability Scanning
The purpose of this policy is to set baseline requirements regarding the application and network security scanning and penetration tests offered by ex...
Policy Template for Vendor Management
The purpose of this policy is to set forth the guidelines that should be followed to maintain the security of organization's information systems and d...
Policy Template for Technology Equipment Handling and Disposal
Technology equipment often contains parts that cannot simply be thrown away due to the fact that it could contain information that anyone outside of t...
Policy Template for Server Security
The purpose of this policy is to establish standards for the base configuration of internal server equipment that is owned and/or operated by {{ organ...
Policy Template for Software Development
The purpose of the Systems Development Life Cycle (SDLC) policy is to describe the requirements for developing and/or implementing software and system...
Policy Template for Software Development Policy
The purpose of the Systems Development Life Cycle (SDLC) policy is to describe the requirements for developing and/or implementing software and system...
Policy Template for Risk Assessment
Information security risk management is the process of identifying, evaluating, and treating risks around the organization’s valuable information. It ...
Policy Template for Personnel Security
This policy establishes the organization personnel security policy, for managing risks from personnel screening, onboarding, termination, transfer and...
Policy Template for Network Security
One of {{ organization.name }} objective is to secure its internal network, network connections and resources from intrusions and to provide/maintain ...
Policy Template for Mobile Device Management
This policy defines procedures and restrictions for any and all end users with legitimate business use connecting mobile devices to {{ organization.na...
Policy Template for Key Management and Cryptography Policy
The purpose of this policy is to establish requirements for selecting cryptographic keys, managing keys, assigning key strengths and using and managin...
Policy Template for IT Asset Management
Asset management is the process of receiving, tagging, documenting, and disposing of equipment. It is important to maintain up to date inventory and a...
Policy Template for Internal Audit
This policy defines and establishes the responsibilities of the internal audit function. The scope of the Internal Audit Policy includes all areas of ...
Policy Template for Information Security
The purpose of this policy is to direct the design, implementation and management of an effective Information Security Program, which ensures that {{ ...
Policy Template for Information Classification
The purpose of this policy is to assist {{ organization.name }} employees in determining what information can be disclosed to non-employees, as well a...
Policy Template for Incident Management
The purpose of this policy is to provide guidelines to manage security incidents that threaten the confidentiality, integrity or availability of infor...
Policy Template for Data Retention and Disposal
The purpose of this policy is to mitigate threats of non-compliance with regulatory, legal and contractual requirements regarding data retention and d...
Policy Template for Customer Support and SLA
EXAMPLE. This Agreement represents a Service Level Agreement (“SLA” or “Agreement”) between Bento Holdings, Inc. and its customers for professional se...
Policy Template for Corporate Ethics
{{ organization.name }} is committed to protecting employees, customers, partners, vendors and the company from illegal or damaging actions by individ...
Policy Template for Change Management Policy
The purpose of this policy is to establish management direction and high-level objectives for the change management process. This policy guides the im...
Policy Template for Bring Your Own Device (BYOD)
{{ organization.name }} grants its employees the privilege of purchasing and using personal devices such as smartphones and tablets of their choice at...
Policy Template for Business Continuity and Disaster Recovery
This document defines {{ organization.name }}’s policy directive on business continuity activities, including business continuity and disaster recover...
Policy Template for Access Control
The purpose of this policy is to establish direction and requirements for access to {{ organization.name }} data, information and systems, and, to ens...
Policy Template for Acceptable Use
The purpose of this policy is to outline the acceptable use of {{ organization.name }}’s computing and network resources (IT resources) as well as oth...