Need a place to begin your policy journey? Our template delves deeply into the aspects behind Acceptable Usage, including both IT-team and employee-facing guidelines for:
- Use of technology across multiple attack vectors (email, cloud, endpoint software),
- Network access, both on-prem and remotely,
- Monitoring by leveraging logs across your infrastructure
- Responding to an incident
- And reporting a breach
This template allows you to fill in the details specific to your organization, and provides a starting point for thinking about your policies such that you can comply with regulatory frameworks. While it is not legal advice, this guiding document can help point your security program, and your ability to demonstrate progress within it, in the right direction.