InstantSecurityPolicy Information Security Policies Frequently Asked Questions

The Security Policy Process

How does the IT policy creation process work?
In 3 quick and easy steps. First, create your online account. Next, our innovative Policy Creation Wizard asks you a series of questions in plain English (not geek speak) and then instantly generates a custom set of IT security policies based on your answers. You can then use the IT policy as it is, since it's already populated with your company's information, or you can tweak the policy to further fit your needs. Of course, the best way to understand how the process works is to do it yourself. Visit cyber security policy free trial, and generate a single policy with no charge or commitment!

We're confident that once you see how fast and straightforward the process is, you'll recognize the value of purchasing a complete set of IT policies to comprehensively cover your company's IT security needs. We make our policies work for you - it doesn't matter what size your company is or what industry you are in - we've created policies for companies ranging from 5 to over 50,000 employees in industries as diverse as healthcare, government, finance, law, manufacturing, and retail. It's quick, easy, and designed to fit your needs.

How can I edit or customize an instant policy?
Automation. We drew upon over three decades of veteran IT policy-writing experience to automate our standard "question and answer" sessions and provide it via the web. Our policy architects spent months researching, designing, and creating the Policy Creation Wizard to automate the exact process our experts would follow when writing a custom policy for a client. The end result is that you receive the same policy you would receive if you spent thousands of dollars to hire our security consultants to write you a custom policy. Tailor your policy to your company's specific security needs as well as its size, culture, and industry, without even picking up the phone or stepping away from your desk. Start the customization process now!

How long does it take to get my IT policies?
Minutes! While the time needed to complete the policy creation process varies from person to person, it usually takes an average of about 30 minutes. General estimates based on specific products are as follows: Bronze Product - 15 minutes, Silver Product - 25 minutes, Gold Product - 40 minutes. To learn more about which of these security products fits your company's needs, visit our information security policy products page. At, we place a high value on your time. Are you super-busy, or only have a few minutes here and there? No problem! Just save your work during the "question and answer" process and come back later when you have more time. Your policy will be there waiting for you to complete it.

Why shouldn't I just create my own policy?
How much time do you have? While we admire your enthusiasm, you're looking at investing hundreds of hours to create policies that we can offer you in minutes. It would take an experienced technical writer at least a month to develop an IT security policy that is as professional, comprehensive, and adaptable as our product. What's more, our IT security policies are written by security experts with years of experience in IT security documentation. Avoid spending hundreds of frustrating hours researching, drafting, organizing, and then implementing a set of technical documents. Instead, receive our premium, professionally-designed product customized to meet your company's needs within minutes.

Once you create your own policy, you can download it immediately. What's more, we guarantee you will be satisfied with your custom IT policy, or we will issue you a 100% refund! With thousands of customers in all 50 US states and in over 50 countries (and counting), all of whom are completely satisfied with our product, we are certain you won't be disappointed. We encourage you to check out our IT security policy whitepaper, Introduction To Security Policies Whitepaper, to learn more about the details involved in developing IT security policies.

Why do I need an IT security policy?
It's critical. IT security policies are the bedrock principles of a company's IT security strategy. Companies with strong information security policies project a professional image that is attractive to clients, and are more capable of conducting efficient, effective, and profitable business. Strong IT policies reduce exposure to risk and legal liability, promote compliance to industry and government regulations such as HIPAA and PCI DSS 3.2, satisfy audit requirements, and can even increase employee productivity!

A properly-written IT security policy and procedure manual will prove to be an invaluable resource should your company ever experience a security incident, and will reinforce and guide your company's efforts to identify and resolve the issue in a timely manner. The list of reasons goes on and on, and are likely different than the next client, and we understand this. In fact, we encourage you to individualize whatever policies you need using our innovative wizard! Allow us to provide you with greater IT policy security so that your company can focus on its core business.

A policy generated online can't be as good as a policy written by a security consultant, can it?
There is no difference, in fact. Experienced and certified security professionals write our policy statements. The only difference is that, using our policy creation wizard, you have control over what your policy says.

Can I get a free trial?
Yes. Visit security policy free trial to set up a trial account today and generate a single policy at absolutely no charge. When you feel comfortable with the process and wish to upgrade your trial account to a complete set of policies, you simply choose a product that fulfills your company's needs. Many clients started out with a free trial account and were so impressed that they chose to get all 19 policies in our Gold Product the same day! Once you sign up for our free trial account, you will see how easy it is develop a customized policy to satisfy whatever requirements your company may have.


What makes different from online templates?
Customization. While our Policy Creation Wizard builds a custom policy for you based on a fully editable set of documents, it's innovative question and answer application models a very specific IT policy for you so that is useful as soon as you receive it. Unlike generic template-based solutions, we provide you with a useful policy - not a project (or a doorstop)! Also, you will receive our Standard Documents packet when you purchase our Gold Product, which can help you to implement your IT policies at your company or organization.

We need input from multiple people when answering the questions, is it possible to get a hardcopy of the questions?
Absolutely. Some users do find it useful to have the questions in a hardcopy format. After your order and upon request, we can send you a PDF of all the questions and answers. This is incredibly helpful if you need IT security policies for a larger corporation with multiple departments, or want to review or discuss the questions in a meeting with the IT group or executive team before answering them online. Either way, let us know and we'll be happy to provide you the questions in "offline" format.

In what format will my IT policies be?
MS Word Rich Text Format (RTF). Our policies are universal enough to work with all major word processing programs, however they are specifically optimized for Microsoft Word 2003 and later editions. Your policies are immediately available, and once downloaded, are easily editable. You will also receive PDF versions of the same policies, which you can immediately put to use.

Will my policy be delivered as one file or multiple files?
Multiple files. What is commonly called a "Security Policy" is actually a collection of policies covering the different aspects of a company's IT Security strategy. We have found that some companies don't have an immediate need for every single policy included within the product they purchased. For this reason, we deliver the policies as distinct files, which can be used separately or easily combined into one document if desired. Your company is best served by an IT security policy strategy that is focused and specific, rather than over-reaching and unnecessary. Regardless, should your company grow, change, or develop a specific policy need in the future, the relevant file will be available as a discrete document to apply as you see fit.

How are my security policies delivered?
Instant download. After you complete the question and answer process using our Policy Creation Wizard, your policies are immediately created and available for download.

Will my final report have the logo on it?
No - it's your policy. Your policy will mention only your company's name and will not include any information about where or how it was generated. While we are effectively writing your policy for you via our automation process, you are choosing what policies you want, so that ultimately the policies are yours and yours alone. Furthermore, our policies are standard enough to fit into almost any company's documentation while still maintaining adequate flexibility, and were specifically engineered to meet this dual-purpose capability. So rest assured that the information security policy you create will bear only your company's name because you built it.

Can I review a sample policy?
Yes. Visit our sample IT security policies page to check out sample policies such as our Acceptable Use Policy and Incident Response Policy. We recommend that you take a look at our whitepaper, "Creating and Implementing an Effective IT Policy," which can provide you with invaluable advice and direction on getting started, particularly if you are unfamiliar with the topic and new to IT security policies in general. You can also set up a free IT security policy trial account to generate a free sample policy customized to your company, which will give you an even better idea of how it all works. We provide you with these resources because we want you to make the most informed decision possible. Many of our thousands of customers have told us that they appreciate these guides and samples because it gives them an idea of what their company needs. These guides can also help to identify and address deficits in IT department policies and procedures manuals, a need many of our customers come to us with as well.

Can I use your policies to comply with complex security regulations and standards?
Yes! In fact, most of our customers use their policies for just that - including PCI DSS, HIPAA, Mass 201 CMR 17.00, SAS70, Sarbanes-Oxley, the ISO standards, CFR Part 11, and more. We specifically created data protection policies like the Gold Security Policy Product for companies such as yours to facilitate compliance with these demanding laws. You can review our compliance information specific to all major regulations. For regulation-specific templates, you can review our compliance data on these regulation-specific pages:

I need a PCI DSS 3.2 compliant policy - should I buy both your Gold Security Product and your Instant PCI Policy?
Probably not. Our Instant PCI policy template is based on our Gold Security Policy Package. In fact, we developed the policy by starting with our popular and comprehensive Gold Product and adapting it to cover version 3.2 of the PCI Data Security Standard introduced in 2016. The end result is an altogether unique cyber security policy that contains the necessary PCI DSS language integrated into a robust and comprehensive IT security strategy framework. An additional perk of our PCI policy is that you have instant access to it as soon as your purchase it! Unlike the Gold Security Product, it is not customized via our Policy Creation Wizard, so you don't have to answer any questions. After purchase, you can immediately download your PCI policy templates. That being said, we have had a number of companies who prefer to purchase both policy products. If you would like to generate both policies, you can do so at the discounted rate of approximately $900. Please contact us if you are interested in purchasing both products - we enjoy speaking to our customers and want to make sure that your needs are met!


What payment options are available to me?
You have a number of options. We currently accept secure online payment by Visa, MasterCard, American Express, and PayPal. PayPal gives us the flexibility to accept virtually any payment method, such as Discover, e-check, and many other options, regardless of whether you have a PayPal account or not. If you have questions regarding our payment options, please feel free to contact us.

Is my credit card information secure?
Absolutely. Your credit card information is transmitted securely over TLS/SSL encryption to our servers. We then use rigorous TLS/SSL encryption to secure your transaction through Authorize.Net, the largest credit card payment gateway in the United States. We do not store or retain your credit card information after your transaction has been processed.

Is it possible to upgrade my Bronze or Silver Security Product later?
Of course. You can upgrade your product at any time after your purchase. It is less expensive, however, to purchase the higher-level security product initially. For more information on which security product is best for you, visit our cyber security policy products page. We recommend that you familiarize yourself with the different product options before making your purchase, however if you find that you need to upgrade, you can do so easily online.

Are your policies guaranteed?
Yes, 100% guaranteed. At any time within 30 days of your order, if you are not completely satisfied with your policies and we are unable to resolve the issue to your satisfaction, we will provide you with a 100% refund. We are very proud of our 99.5% customer satisfaction rate, and work hard to ensure that the integrity and strength of our products are equaled by our loyalty to our customers.


Do you offer a reseller program?
We do. We understand that some companies may need help to not only create their own policies, but to customize and implement them. To meet this demand, we rely on our network of Value Added Resellers. Aside from providing your customers with a comprehensive IT Security Policy option, the VAR program pays commissions on every order after your first order. If you are interested, please contact us. We are always looking for partners who want to help their customers implement a solid cyber security program.

I am an IT Consultant and would like to offer your policies to my customers - is this possible?
It is possible. However, per our terms of use, you would need to purchase and generate an IT policy for each customer. If you plan to generate more than one policy, it would probably make sense to join our Value Added Reseller program, which was developed exactly for this purpose. Please contact us to discuss your plans in greater detail.


What are others saying about
See for yourself. Visit customer testimonials and read dozens of reviews by customers representing multiple industries and fields distributed across the globe. We maintain a 99.5% customer satisfaction rating and an A+ rating with the Better Business Bureau, and, most importantly, we guarantee your satisfaction!

What if there is a problem with my order?
We'll fix it. While it's uncommon for this to occur, we are committed to customer service and will do everything we can to resolve the issue to your satisfaction. In the exceptionally rare event that we are unable to address the problem, we offer a 100% money-back guarantee.


Are your policies for United States-based companies only?
Not at all! In addition to having customers in all 50 states, we maintain a strong global presence and have happy customers in 50+ countries ranging from the United Kingdom to Australia to Malaysia to Saudi Arabia, and everywhere in between. Our security policies are written according to the internationally recognized core principles of the C-I-A triad: Confidentiality, Integrity, and Availability. We designed our policies to comply with internationally accepted industry best practices, and are not tied to any single country's security regulations or standards.


"You helped me get this monkey off my back. I look like a hero."
Mary Crutchfield - Network Manager, New York, NY

"PCI compliance was too complicated for me to waste time figuring how what I needed. Your IT security policies took that burden from me. I edited the policies to include a handful of items specific to our company and this project was complete."
Sam Evans - IT Director, Tulsa, Ok

"Thank you for making my life easy."
David Owens - Small Business Owner, Misson TX

"I've been in the business a long time and these IT policies and procedures are very well written. Incredible value."
James Overton - CTO, Dubai, United Arab Emirates

Copyright © 2008-2022
Privacy Policy | Terms of Use | Contact Us