Security - Templates & Policies

General Security – User Acceptable Use Policy

Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Security Incident Management Runbook: Malware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management Runbook: Ransomware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management Runbook: Third-Party Incident

Use this template to help you develop an incident-specific runbook and accompanying workflows.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us