Security Strategy & Governance - Templates & Policies

Record of Processing Template

As a data controller or processor, align your required record of processing requirements to your activities.

Legitimate Interest Assessment Template

Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.

Data Protection Policy

Use Info-Tech's Data Protection Policy to define and document the necessary data privacy and protection controls.

Security Risk Governance Responsibilities and RACI Template

This template will allow you to structure how your risk management groups, including the board of directors and the IT team, will function and own different process areas.

Security Risk Management Presentation Template

This template offers a sample presentation of a risk management program, including an overview of the program and major risks.

Security Risk Management Summary Template

This template offers a summary report of a risk management program, including an overview of the program and major risks.

Firewall Policy

Use this policy template to define and support your organization's firewall operations management.

Checklist for Third-Party Providers

Ensure you are getting the level of service you expect.

Security Operations Policy for Third-Party Outsourcing

Ensure secure operations of information processing with regards to implementation of an external third party.

Third-Party Security Policy Charter Template

Make sure you that your desire to outsource matches your organization's security mandate.
GET HELP Contact Us
×
VL Methodology