Specialist Security & Risk Management Consultants

Information Protection Policy – Template for Free Download

An information protection policy is essential for your business.

An information protection policy is essential for your business.

Almost every business, what ever its size and function, handles sensitive data. This can range from a list of your customers and their addresses, to full-blown business intelligence systems that track their trends.

However you manage your customers, it is essential that you have a robust, well thought out Information Protection Policy in place. To help you develop this, we have made an Information Protection Policy template available for free download, that cover the main topics. This will allow you to concentrate on developing the robust protection necessary rather than spend time working out on how to document it.

This template is also ideal (and based on widely used formats) for local government authorities who need to produce suitable documentation.

Similar posts
  • Security breaches – do you know... One sad fact about security is that no matter what controls you put in place, you will suffer breaches and if you are on the internet it is likely to happen sooner rather than later. People sometimes hold to a “physical world” security model which has a clearly defined threat actor (e.g. a burglar) casing [...]
  • Security researchers demo GPU Keylogg... Reported on the Register today, security researchers have demonstrated how malicious code can be run on graphics processors (GPUs) rather than the central processing unit (CPUs) at the heart of a [...]
  • Security Patches – Internet Exp... For lots of enterprises, security patches are a pain to test, a pain to deploy and frequently frustrating when they require downtime for the inevitable system reboots. However, security patches are also a significantly important mechanism for protecting your environment against attacks. They really are. This month, Microsoft have announced 13 security patches – three of which are [...]
  • Phishing attacks continue to evolve a... As most internet users know, phishing attacks are very common. The term itself dates back to 1995 (e.g. AOHell) and social engineering (which is basically what phishing is) goes back as long as we have had societies. At a basic level, phishing is an attempt by a malicious party to get the recipient (victim) to [...]
  • Budgets – Security’s frie... Budgets are integral to every business. The start up’s business plan has to include budgets and the multinational will have an entire finance unit geared around making sure that every year the numbers are crunched, and budgets allocated. At a very fundamental level, a budget allows businesses to grow. It allows them to develop without going [...]

Recent Tweets Recent Tweets