Security Risk, Strategy & Governance - Templates & Policies

Employee Monitoring Policy – Employee-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Security Initiative Skills Guide

Use this template to document future initiatives skill needs.

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

General Security – User Acceptable Use Policy

Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.

End-User Security Knowledge Test Template

This template provides example survey questions to ask an organization’s end users to assess their current level of understanding of security topics and organizational...
GET HELP Contact Us
×
VL Methodology