Your data doesn't train Genie's AI
You keep IP ownershipΒ of your information
1. Purpose and Scope: Defines the objectives and applicability of the security policy
2. Definitions: Key terms and concepts used throughout the policy
3. Roles and Responsibilities: Defines who is responsible for various security aspects
4. Data Classification: Categories of data and their security requirements
5. Access Control: Rules for system and data access
6. Security Controls: Technical and organizational security measures
7. Incident Response: Procedures for handling security incidents
1. Cloud Security: Security requirements and controls specific to cloud services usage
2. Remote Working Security: Security measures and protocols for remote work arrangements
3. Industry-Specific Requirements: Additional security requirements for regulated industries such as finance or healthcare
1. Schedule 1: Security Controls Matrix: Detailed list of security controls and their implementation status
2. Schedule 2: Incident Response Procedures: Detailed procedures for different types of security incidents
3. Schedule 3: Data Classification Guidelines: Detailed guidelines for classifying different types of data
4. Schedule 4: Access Control Matrix: Detailed mapping of roles to access permissions
5. Schedule 5: Security Awareness Training Materials: Training materials and guidelines for staff
Find the exact document you need
Security Assessment Policy
A Singapore-compliant policy document defining security assessment procedures and requirements under local cybersecurity laws.
Audit Logging Policy
A Singapore-compliant policy document that establishes requirements and procedures for systematic recording and preservation of system activities within an organization.
Client Data Security Policy
A policy document establishing data protection standards for client information under Singapore's PDPA framework.
Security Breach Notification Policy
A policy document outlining data breach notification procedures under Singapore law, complying with PDPA requirements and regulatory guidelines.
Vulnerability Assessment And Penetration Testing Policy
A Singapore-compliant policy document governing vulnerability assessment and penetration testing activities within an organization.
Client Security Policy
A comprehensive security policy document that outlines measures for protecting client data and information systems under Singapore law.
³±π²ΤΎ±±πβs Security Promise
Genie is the safest place to draft. Hereβs how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³±π²ΤΎ±±πβs AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it