Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Purpose and Scope: Defines the objectives of the security policy and its application scope, including types of information assets covered
2. Definitions and Interpretation: Defines key terms used throughout the policy, including technical terms and security-related concepts
3. General Security Principles: Outlines the fundamental security principles and framework that guide the policy
4. Access Control and Authentication: Details requirements for user authentication, access rights management, and password policies
5. Data Classification and Handling: Specifies how different types of data should be classified and handled based on sensitivity
6. Network and System Security: Describes security requirements for networks, systems, and infrastructure
7. Data Protection and Privacy: Outlines compliance with Swiss data protection laws and privacy requirements
8. Incident Response and Reporting: Procedures for identifying, reporting, and responding to security incidents
9. Business Continuity and Disaster Recovery: Requirements for maintaining business operations during security incidents
10. Compliance and Audit: Details compliance requirements and audit procedures
11. Policy Enforcement: Describes enforcement mechanisms and consequences of non-compliance
1. Cloud Services Security: Required when cloud services are used, detailing specific security requirements for cloud environments
2. Mobile Device Management: Include when mobile devices are used to access client data or systems
3. Third-Party Security Requirements: Necessary when external vendors or contractors have access to systems or data
4. Physical Security Requirements: Include when physical access to facilities or hardware is relevant
5. Industry-Specific Compliance: Add when specific industry regulations apply (e.g., financial services, healthcare)
6. Remote Work Security: Include when remote work arrangements are permitted
7. IoT Device Security: Required when IoT devices are part of the infrastructure
1. Schedule A - Acceptable Use Policy: Detailed guidelines for acceptable use of information systems and resources
2. Schedule B - Security Controls Matrix: Detailed technical security controls and their implementation requirements
3. Schedule C - Incident Response Procedures: Step-by-step procedures for handling different types of security incidents
4. Schedule D - Data Classification Guidelines: Detailed criteria for classifying different types of data and required security measures
5. Schedule E - Security Awareness Training Requirements: Details of required security awareness training programs and frequency
6. Appendix 1 - Security Contact Information: List of security contacts and escalation procedures
7. Appendix 2 - System Access Request Forms: Standard forms for requesting system access and privileges
8. Appendix 3 - Security Audit Checklist: Checklist for internal security audits and assessments
Find the exact document you need
Security Logging And Monitoring Policy
A Swiss-compliant policy document establishing requirements and procedures for security logging and monitoring activities, aligned with FADP/DSG requirements.
Security Assessment Policy
A Swiss-compliant security assessment framework outlining requirements and procedures for evaluating organizational security controls and ensuring regulatory compliance.
Audit Logging Policy
Swiss-compliant policy document establishing requirements and procedures for system and application audit logging, aligned with FADP/DSG and related regulations.
Phishing Policy
A Swiss-compliant internal policy document establishing guidelines and procedures for preventing and responding to phishing attacks, aligned with Swiss federal laws and data protection requirements.
Information Security Audit Policy
Swiss-compliant Information Security Audit Policy establishing requirements and procedures for security audits under Swiss federal data protection laws.
Client Security Policy
A Swiss law-governed security policy document establishing requirements and procedures for protecting client information and systems, aligned with FADP/DSG requirements.
Consent Security Policy
A Swiss law-compliant security policy for managing and protecting consent data, aligned with FADP/DSG requirements and EU GDPR principles.
Secure Sdlc Policy
A comprehensive policy document outlining secure software development lifecycle requirements and procedures, aligned with Swiss regulations and international security standards.
Security Audit Policy
A policy document outlining security audit requirements and procedures for organizations in Switzerland, ensuring compliance with Swiss data protection laws and security standards.
Email Security Policy
A Swiss-compliant email security policy document outlining requirements and procedures for secure email usage, aligned with FADP/DSG and related Swiss regulations.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)