Hi, and welcome to our lounge. Here you will find various assets that we believe will help you to be more successful in your business.
We all know that policies, processes, and procedures are about as exciting as attending the local accounting conference but they’re an essential part of any growing business. Customers, regulators, and auditors seek these out as signs that you’re a responsible, trustworthy business and a great partner to work alongside. We hope you find them useful and if you need something in particular that you cannot find here, drop us a message, we’ll be delighted to help.
If using one of our templates, just copy and replace CompanyX with your company details and you’re ready to go!
Technical Vulnerability Management Policy
Technical Vulnerability Management is the ongoing, risk-informed process of addressing weaknesses on Information Technology (IT) infrastructure, operating systems, and applications.
Data Retention Policy
Companies generate a wide range of data, which is recorded in documents and records. How we manage them is key from both a commercial and a legislative/ compliance perspective.
Removable Storage Device Use Policy
This Policy aims to ensure that the use of removable media devices is controlled in order to enable the correct data to be made available where it is required.
This document provides standards and guidance for acceptable behaviour for the use of personal devices, such as laptops, smart phones, and tablets.
Information Breach Policy
The purpose of this Policy is to provide general guidance to enable quick and efficient recovery from security incidents and minimize disruption to critical computing services or loss or theft of sensitive or mission critical information.
Laptop Computer Use Policy
This policy is provided to assist in assuring that your laptop is secure at all times detailing that users shall exercise appropriate professional judgment and common sense when using laptop computers, equipment, and accessories.
User Account Review Policy
This policy is designed to help ensure appropriate individuals have the right levels of access to and systems data that is essential to perform their job functions.
Client Data Management Policy
This policy defines the minimum standards for accessing, storing, retaining, and monitoring access to party client data.
This policy applies to access to Sensitive or Restricted data.
Help Desk Guide
Most IT Support issues are surprisingly generic in nature and can be handled throught he application and distribution of a simple Q&A guide which can be shared with the users.