Specialist Security & Risk Management Consultants

Information Protection Policy – Template for Free Download

An information protection policy is essential for your business.

An information protection policy is essential for your business.

Almost every business, what ever its size and function, handles sensitive data. This can range from a list of your customers and their addresses, to full-blown business intelligence systems that track their trends.

However you manage your customers, it is essential that you have a robust, well thought out Information Protection Policy in place. To help you develop this, we have made an Information Protection Policy template available for free download, that cover the main topics. This will allow you to concentrate on developing the robust protection necessary rather than spend time working out on how to document it.

This template is also ideal (and based on widely used formats) for local government authorities who need to produce suitable documentation.

Similar posts
  • 3 essential elements of any Infosec f... As the news often shows, Information Security (infosec) is a big part of any organisation. From the small business with just a couple of computers to the global enterprise, infosec wraps around what you do, keeping you safe. Infosec is the function which keeps you servicing your customers. It protects your data. It ensures that [...]
  • Incident Response – 5 key stake... Incident response is a vital component of every organisations security. It provides the safety net for when the inevitable happens and other controls fail. A good incident response team will also have subject matter experts who can guide your entire organisation’s security strategy. If you take security even slightly seriously, you will have an incident [...]
  • AV is not dead – it just has li... Antivirus (AV) has been around for decades now and this is both a good and bad thing. On one hand, AV is so well known most people already understand that they need to have it. But on the other, all the attackers know about it. This means the first step in pretty much every attack [...]
  • Supplier Security – A lesson fo... Supplier security is something most organisations are at least aware of, and lots actually realise they need to do something about it. However, most of the time, “doing something” about it involves a quick chat with the supplier, possibly a generic check-list and a review that the contract at least mentions security. The problem is thinking [...]
  • Phishing and Malware – FedEx mi... It seems that every day, new script kiddies discover the likes of the Social Engineering Toolkit or Metasploit and launch a new wave of phishing attacks. Unfortunately it seems that this time the attackers are too lazy to even try. Today’s email – screenshot on the right – is a reasonably straight forward phishing attempt. The [...]

Recent Tweets Recent Tweets