Security - Templates & Policies

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Operations Security Policy – ISO

The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.

Employee Monitoring Policy – IT-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Data Privacy Program Report

This template outlines the operations of the Data Privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and...

Data Retention Policy Template

Use this template to set the foundational requirements of data retention within the organization.

Penetration Test RFP Template

Use this template to help create a request for proposal (RFP) for a Penetration Test according to your enterprise requirements.

Vulnerability Management Policy

This template will allow you to create a vulnerability management policy, which includes scope of the program and the high-level remediation process.
GET HELP Contact Us
×
VL Methodology