Security - Templates & Policies

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Employee Monitoring Policy – IT-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Employee Monitoring Policy – Employee-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Security Metrics Executive Communications Presentation

Communication is a significant contributor to the success of your metrics program. Make sure you're sharing the metrics that truly matter to business stakeholders.

Security Awareness and Training Module Builder and Training Schedule

This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.

Board-Level Security Metrics Presentation Template

This template will help you condense and organize your presentation into just three slides, which will help you convey the most critical information to the board...

Information Security Communication Plan Template

Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...

Cloud Security Governance Program Template

Use this template to ensure the continued maintenance of your cloud program's security.
GET HELP Contact Us
×
VL Methodology