Governance, Risk & Compliance - Templates & Policies

Vulnerability Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Risk Management Summary Template

This template offers a summary report of a risk management program, including an overview of the program and major risks.

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...

Risk Event Action Plan

Integrate IT risk management with business risk management by creating a paper trail for key risks.

Risk Report

Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...

Information Security Steering Committee Stakeholder Presentation

Use this template to explain the goals and benefits of the Information Security Steering Committee.

Security Compliance Process Template

Use this template to help document your information security compliance management program.

Record of Processing Template

As a data controller or processor, align your required record of processing requirements to your activities.

Legitimate Interest Assessment Template

Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.

A Guide to Data Subject Access Requests

To enable effective execution of compliance to the GDPR, the Data Subject Access Request procedure within the organization should be aligned to the requirements specified...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us