Use the Ransomware Strategic Plan Summary Document to discuss the preventative, responsive, and recovery measures that need to be implemented in the event of a ransomware...
|
|
Tackle digital risk profiling, management, and integration with a structured planning template that helps you document each step of the process and assign ownership and...
|
|
Use this template to help document your information security compliance management program.
|
|
Use this checklist to validate that you have prepared for all steps of the request process.
|
|
Use this template to document what will be included on your subject access request landing page.
|
|
Use this template to build procedures for subject access requests.
|
|
Use this example as a starting point to document your subject access request procedure for erasure requests.
|
|
Use this example as a starting point to document your subject access request procedure for rectification requests.
|
|
Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.
|
|
The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.
|
|