Security - Templates & Policies

Ransomware Strategic Plan Summary Document

Use the Ransomware Strategic Plan Summary Document to discuss the preventative, responsive, and recovery measures that need to be implemented in the event of a ransomware...

Digital Risk Management Charter

Tackle digital risk profiling, management, and integration with a structured planning template that helps you document each step of the process and assign ownership and...

Security Compliance Process Template

Use this template to help document your information security compliance management program.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

Operations Security Policy – ISO

The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology