Included in the Gold Package only is a set of common forms to assist in your rollout your IT Security Policies. These commonly-used forms, which are fully-editable in order to be easily integrated with your existing processes, will help create a "paper trail" to ensure compliance with the applicable polices.
Forms provided with the Gold Package are:
Security Incident Report
This form covers both physical and electronic IT security incidents. It is intended to record any potential compromises of company data, identify if confidential data was involved, and the scope of the incident.
Notice of Policy Noncompliance
This form is to be given users who violate company policies. It includes a description of the incident, actions taken, corrective actions, and next steps.
Account Setup Request
This form is to be completed prior to initial user account setup. It covers what type of access is required and any special needs.
Guest Network Access Request
This form is to be used when a guest needs access to company IT resources. It details the type of access the guest needs (as specifically as possible), AUP acceptance, and any additional information.
Request for Policy Exception
This form is to be completed by users or management when an exception to an established policy is needed. It includes the reason and details of the request, the business necessity of the request, and any alternatives.
Policy Amendment Form
This form is a template in the same format of the security policies, which can be used to provide a record of any changes made to policies.
This very simple document provides a sign-in method for visitors and staff, if required by your policy.