Security Risk, Strategy & Governance - Templates & Policies

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Employee Monitoring Policy – IT-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Employee Monitoring Policy – Employee-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Data Privacy Program Report

This template outlines the operations of the Data Privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and...

Data Retention Policy Template

Use this template to set the foundational requirements of data retention within the organization.

Security Governance Model Facilitation Questions

Use these questions to help spur discussion about how your governance will be structured.

Information Security Service Catalog

Use this Security Service Catalog Template to help you track the various services being offered by your security program.

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.
GET HELP Contact Us
×
VL Methodology