The Lounge


Hi, and welcome to our lounge. Here you will find various assets that we believe will help you to be more successful in your business.


We all know that policies, processes, and procedures are about as exciting as attending the local accounting conference but they’re an essential part of any growing business. Customers, regulators, and auditors seek these out as signs that you’re a responsible, trustworthy business and a great partner to work alongside. We hope you find them useful and if you need something in particular that you cannot find here, drop us a message, we’ll be delighted to help.

Document Name



If using one of our templates, just copy and replace CompanyX with your company details and you’re ready to go!

Technical Vulnerability Management Policy

Technical Vulnerability Management is the ongoing, risk-informed process of addressing weaknesses on Information Technology (IT) infrastructure, operating systems, and applications.

Data Retention Policy

Companies generate a wide range of data, which is recorded in documents and records. How we manage them is key from both a commercial and a legislative/ compliance perspective.

Removable Storage Device Use Policy

This Policy aims to ensure that the use of removable media devices is controlled in order to enable the correct data to be made available where it is required.

BYOD Policy

This document provides standards and guidance for acceptable behaviour for the use of personal devices, such as laptops, smart phones, and tablets.

Information Breach Policy

The purpose of this Policy is to provide general guidance  to enable quick and efficient recovery from security incidents and minimize disruption to critical computing services or loss or theft of sensitive or mission critical information.

Laptop Computer Use Policy

This policy is provided to assist in assuring that your laptop is secure at all times detailing that users shall exercise appropriate professional judgment and common sense when using  laptop computers, equipment, and accessories.

User Account Review Policy

This policy is designed to help ensure appropriate individuals have the right levels of access to and systems data that is essential to perform their job functions.

Client Data Management Policy

This policy defines the minimum standards for accessing, storing, retaining, and monitoring access to party client data.

This policy applies to access to Sensitive or Restricted data.

Help Desk Guide

Most IT Support issues are surprisingly generic in nature and can be handled throught he application and distribution of a simple Q&A guide which can be shared with the users.