Governance, Risk & Compliance - Templates & Policies

A Guide to Data Subject Access Requests

To enable effective execution of compliance to the GDPR, the Data Subject Access Request procedure within the organization should be aligned to the requirements specified...

Legitimate Interest Assessment Template

Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.

Record of Processing Template

As a data controller or processor, align your required record of processing requirements to your activities.

Security Risk Management Summary Template

This template offers a summary report of a risk management program, including an overview of the program and major risks.

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Risk Report

Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...

Risk Event Action Plan

Integrate IT risk management with business risk management by creating a paper trail for key risks.

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...

Administrative Rights Policy

The administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use...

Instant Messaging Usage and Security Policy

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us