Get Exclusive
White Papers
Follow Us TwitterFollow Us FacebookFollow Us Blog Janco RSS FeedGoogle Plus


Security Policies and Procedures Manual Template

Security Manual Template

ISO 27000 - Sarbanes Oxley Patriot Act - HIPAA - PCI DSS Complaint

Order

Download

With all of the new legislation, there are more security requirements that need to be met.  Requirements like Sarbanes-Oxley, HIPAA, PCI-DSS, and ITIL, are primary concerns of CIOs as executive management is depending on IT to have the right security policies and procedures in place.

We have just the download you need to create a world class plan and assure you leave no stone unturned. With this Template we walk you through the entire process, providing all the tools you need along the way.  As an added benefit you can purchase an update service which keeps these polcies and procedures abreast of the latest legislated and mandated requirements. 

This Security Manual for the Internet and Information Technology is over 230 pages in length. All versions of the Security Manual template include both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address Sarbanes Oxley compliance).   In addition, the Security Manual Template PREMIUM Edition  contains 16 detail job descriptions that apply specifically to security and Sarbanes Oxley, ISO 27000, PCI DSS, and HIPAA.

The policies have just been updated and include a section on Log Management which is required to meet the new compliance mandates.

The Security Manual template can be purchased with the Disaster Recovery program or by itself in three: Standard, Premium, and Gold.

Security PoliciesStandard Edition Security Manual Template

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerability Assessment Form PDF and MS Excel Format
  • HIPAA Audit Program MS Word Format
  • Sarbanes Oxley Section 404 Checklist MS Word Format
  • Security Audit Program - fully editable
    • Comes in MS EXCEL and PDF formats
    • Meets ISO 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
    • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including:

    • Blog Policy Compliance
    • Company Asset Employee Control Log
    • Email - Employee Acknowledgment
    • Employee Termination Checklist
    • Internet Access Request
    • Internet Use Approval
    • Internet & Electronic Communication - Employee Acknowledgment
    • Mobile Device Access and Use Agreement
    • Employee Security Acknowledgement Release
    • Preliminary Security Audit Checklist
    • Security Access Application
    • Security Audit Report
    • Security Violation Reporting
    • Sensitive Information Policy Compliance Agreement

Security PoliciesPremium Edition Security Manual Template

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerability Assessment Form PDF and MS Excel Format
  • HIPAA Audit Program MS Word Format
  • Sarbanes Oxley Section 404 Checklist MS Word Format
  • Security Audit Program - fully editable
    • Comes in MS EXCEL and PDF formats
    • Meets ISO 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
    • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
    Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including:

    • Blog Policy Compliance
    • Company Asset Employee Control Log
    • Email - Employee Acknowledgment
    • Employee Termination Checklist
    • Internet Access Request
    • Internet Use Approval
    • Internet & Electronic Communication - Employee Acknowledgment
    • Mobile Device Access and Use Agreement
    • Employee Security Acknowledgement Release
    • Preliminary Security Audit Checklist
    • Security Access Application
    • Security Audit Report
    • Security Violation Reporting
    • Sensitive Information Policy Compliance Agreement
  • Security Job Descriptions MS Word Format
    • Chief Security Officer (CSO)
    • Chief Compliance Officer (CCO)
    • VP Strategy and Architecture
    • Director e-Commerce
    • Database Administrator
    • Data Security Administrator
    • Manager Data Security
    • Manager Facilities and Equipment
    • Manager Network and Computing Services
    • Manager Network Services
    • Manager Training and Documentation
    • Manager Voice and Data Communication
    • Manager Wireless Systems
    • Network Security Analyst
    • System Administrator - Unix
    • System Administrator - Windows

Security PoliciesGold Edition Security Manual Template

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerability Assessment Form PDF and MS Excel Format
  • HIPAA Audit Program MS Word Format
  • Sarbanes Oxley Section 404 Checklist MS Word Format
  • Security Audit Program - fully editable
    • Comes in MS EXCEL and PDF formats
    • Meets ISO 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
    • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including:

    • Blog Policy Compliance
    • Company Asset Employee Control Log
    • Email - Employee Acknowledgment
    • Employee Termination Checklist
    • Internet Access Request
    • Internet Use Approval
    • Internet & Electronic Communication - Employee Acknowledgment
    • Mobile Device Access and Use Agreement
    • Employee Security Acknowledgement Release
    • Preliminary Security Audit Checklist
    • Security Access Application
    • Security Audit Report
    • Security Violation Reporting
    • Sensitive Information Policy Compliance Agreement
  • 281 job descriptions from the Internet and IT Job Descriptions HandiGuide in MS Word Format including all of the job descriptions in the Premium Edition.

Order Security ManualDownload Sample

Security Manaual Policies and Procedures Topics

  • Account privileges
  • Antivirus
  • Asset disposal
  • Backup end user
  • Backup server
  • Blackberry usage 
  • Blog
  • Business Continuity
  • Cellular phone
  • Change control
  • Change management
  • Copyright
  • Disaster Recovery
  • Document retention
  • Downtime
  • Email acceptable use
  • Email archiving
  • Email communications
  • Equipment loan
  • Firewall
  • GPS cell phone
  • Hardware sanitization
  • Helpdesk triage
  • Instant messenger
  • Internet usage
  • Move-add-change
  • Outsourcing
  • Password
  • Patch management
  • PDA usage
  • Personal network
  • Printer
  • Purchasing
  • Remote Access
  • Server space usage
  • Software acceptance
  • Software development
  • Software install
  • Support Technology
  • Standards
  • Telecommuting
  • Third party access
  • Travel
  • Voicemail
  • Web posting

Clients can also subscribe to Janco's Security Manual update service and receive all updates to the Security Manual Template. 

The template includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for the following major topics / sections for your security plan:

Order Security ManualDownload Sample