privacy
Familiarize Yourself With the Digital ID Ecosystem Taxonomy
Templates And Policies: CIO
This taxonomy is a collection of the essential terms and definitions in the digital identity landscape.
Build a Data Privacy Program
Blueprint: Security
Data Privacy Program Report
Templates And Policies: Security
This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and business-relevant context.
Data Protection Policy
Templates And Policies: Security
Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.
Privacy Notice Template – External Facing
Templates And Policies: Security
Use this external-facing template to customize a privacy notice that provides users with a comprehensive understanding of how you process their personal data, why, and how they can manage their data.
Modernize and Transform Your End-User Computing Strategy
Blueprint: Infrastructure & Operations
BYOD Acceptable Use Policy
Templates And Policies: Infrastructure & Operations
The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a company’s corporate network for business purposes.
General Security – User Acceptable Use Policy
Templates And Policies: Security
Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.
Secure Operations in High-Risk Jurisdictions
Blueprint: Security
Guidelines for Compliance With Local Security and Privacy Laws Template
Templates And Policies: Security
Use this template to develop guidelines for compliance with local security and privacy laws.
Confidentiality and Non-Disclosure Agreement
Templates And Policies:
Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this template to provide a structure for documenting a confidentiality and non-disclosure agreement with an employee or contractor.
Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this template to provide a structure for documenting a confidentiality and non-disclosure agreement with an employee or contractor..
Data Access Policy
Templates And Policies: Data & Business Intelligence
The data access policy will outline the responsibilities for the protection of institutional data and prevent unauthorized, wrongful, or malicious use.
Embed Privacy and Security Culture Within Your Organization
Blueprint: Security
Privacy and Security Engagement Charter
Templates And Policies: Security
The Privacy and Security Engagement Charter provides the planning canvas for the initial stages of developing the plan and supporting roadmap for privacy and security culture.
Privacy and Security Engagement Playbook
Templates And Policies: Security
Use the Privacy and Security Playbook as a convenient way to communicate the components of your privacy and security engagement initiative.
Achieve Digital Resilience by Managing Digital Risk
Blueprint: Security
Digital Risk Management Executive Report
Templates And Policies: Security
Build the business case for effective digital risk management to drive successful digital transformation. This executive presentation outlines the core components of the digital risk profile output and provides recommendations to help drive digital resilience.
Digital Risk Management Charter
Templates And Policies: Security
Tackle digital risk profiling, management, and integration with a structured planning template that helps you document each step of the process and assign ownership and accountability.
Develop a Five Year Data Architecture Plan
Blueprint: Enterprise Architecture
Data Integration and Virtualization Policy
Templates And Policies: Data & Business Intelligence
The data integration and virtualization policy will outline the responsibilities for mitigating the risks to personal privacy when integrating, replicating, or virtualizing personal data, and ensure data integration, replication, or virtualization only occurs when necessary.
Build Business-Aligned Privacy Programs for Higher Education Institutions
Blueprint: Industry Coverage
Student Privacy Notice
Templates And Policies: Security
A best-of-breed template to help education institutions to build a clear, concise, and compelling privacy notice.
Reduce and Manage Your Organization’s Insider Threat Risk
Blueprint: Security
Employee Monitoring Policy – IT-Facing
Templates And Policies: Security
Policy notifying employees of any monitoring that takes place on the systems they use.
Employee Monitoring Policy – Employee-Facing
Templates And Policies: Security
Policy notifying employees of any monitoring that takes place on the systems they use.
Telephone and Voicemail Acceptable Use Policy
Templates And Policies: Templates & Policies
Telephone and voicemail services are crucial and versatile communication tools for any business. However, they also run the risk of being repurposed for personal calls due to their convenience. Every organization needs to construct a policy to protect themselves and their employees against...
Risks addressed by this policy: Going over budget in communications due to inappropriate personal employee phone calls Offensive and inappropriate employee behavior and telephone/voicemail messages Reduced availability of phone lines due to excessive personal usage Legal and confidentiality/privacy obligations via monitoring phone transmissions
Effectively Acquire Infrastructure Services
Blueprint: Infrastructure & Operations
Infrastructure Service RFP Template
Templates And Policies: Enterprise Architecture
Use the prefilled examples in this RFP template to procure a variety of infrastructure outsourcing services.
Secure Your High-Risk Data
Blueprint: Security
Data Security Technical Report
Templates And Policies: Security
Effective data security involves many moving parts, and will require support from a number of key individuals within the organization. The Data Security Technical Report provides a detailed outline of the current and future state, and the bridging steps.
Filter by Content Type
- All Results
- Note (290)
- Software Reviews (142)
- Blueprint (44)
- Tech Note (31)
- Video (30)
- Templates And Policies (29)
- Tool (24)
- Live Webinar (19)
- Diagnostic (14)
- In The News (14)
- Industry (11)
- Academy Course (9)
- Job Description (1)
- Knowledge Base (1)
- Press Release (1)
- Research Center (1)
- Site Page (1)