Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Client Security Policy
"I need a Client Security Policy for a financial services company operating in Austria, complying with GDPR and Austrian banking regulations, with particular emphasis on customer data protection and third-party risk management, to be implemented by March 2025."
1. Document Control: Version number, approval status, review dates, and document owner
2. Introduction: Purpose and scope of the security policy
3. Legal Framework: Reference to applicable laws (GDPR, DSG, etc.) and regulatory requirements
4. Definitions: Key terms and concepts used throughout the policy
5. Roles and Responsibilities: Definition of security roles and organizational responsibilities
6. Information Classification: Categories of information and their security requirements
7. Access Control: Policies for user access, authentication, and authorization
8. Data Protection: Measures for protecting personal and sensitive data
9. Network Security: Requirements for network infrastructure and communications
10. System Security: Security requirements for systems, applications, and devices
11. Incident Management: Procedures for handling and reporting security incidents
12. Business Continuity: Security measures for ensuring business continuity
13. Compliance and Auditing: Monitoring, auditing, and compliance requirements
14. Policy Violations: Consequences of non-compliance and disciplinary procedures
1. Cloud Security: Additional section for organizations using cloud services
2. Mobile Device Management: Section required if organization allows mobile devices
3. Remote Work Security: Required if organization supports remote working
4. Third-Party Security: Required if organization works with external vendors/contractors
5. Industry-Specific Controls: Additional controls for regulated industries (finance, healthcare)
6. Physical Security: Required for organizations with physical premises requiring protection
7. Software Development Security: Required for organizations developing software
1. Appendix A: Acceptable Use Policy: Detailed guidelines for acceptable use of IT resources
2. Appendix B: Password Policy: Specific requirements for password creation and management
3. Appendix C: Security Controls Matrix: Detailed technical security controls and requirements
4. Appendix D: Incident Response Procedures: Step-by-step procedures for handling security incidents
5. Appendix E: Data Processing Register: GDPR-required documentation of data processing activities
6. Appendix F: Security Awareness Training: Training requirements and materials
7. Appendix G: Risk Assessment Template: Template for conducting security risk assessments
8. Appendix H: Audit Checklist: Checklist for internal security audits
Authors
Access Control
Authentication
Authorization
Breach
Business Continuity
Confidential Information
Controller
Critical Systems
Cyber Attack
Data Subject
Data Protection Officer
Disaster Recovery
Encryption
End User
Information Asset
Information Classification
Information Security
Information System
Incident
Malware
Multi-Factor Authentication
Network Security
Personal Data
Processor
Protected Data
Risk Assessment
Security Controls
Security Event
Security Incident
Sensitive Data
System Administrator
Third Party
Threat
User
Violation
Vulnerability
Compliance Requirements
Data Protection
Access Control
Authentication
Authorization
System Security
Network Security
Password Management
Physical Security
Mobile Device Security
Remote Access
Incident Response
Business Continuity
Disaster Recovery
Asset Management
Change Management
Risk Management
Third Party Security
Acceptable Use
Data Classification
Data Handling
Encryption
Backup and Recovery
Monitoring and Logging
Audit and Assessment
Training and Awareness
Policy Violations
Enforcement
Review and Updates
Financial Services
Healthcare
Technology
Manufacturing
Professional Services
Retail
Telecommunications
Education
Government
Energy
Transportation
Insurance
Legal Services
Construction
Real Estate
Information Security
IT Operations
Legal
Compliance
Risk Management
Human Resources
Internal Audit
Data Protection
Infrastructure
Security Operations Center
Business Continuity
Project Management Office
Executive Leadership
Procurement
Quality Assurance
Chief Information Security Officer (CISO)
Chief Technology Officer (CTO)
IT Director
Security Manager
Compliance Officer
Data Protection Officer
Risk Manager
IT Security Specialist
System Administrator
Network Administrator
Security Analyst
Privacy Officer
Information Security Manager
Security Operations Manager
Audit Manager
Legal Counsel
HR Director
Department Managers
Project Managers
Find the exact document you need
Infosec Audit Policy
An Austrian-compliant Information Security Audit Policy establishing frameworks for security audits under EU and Austrian law.
Manage Auditing And Security Log Policy
An Austrian-compliant policy document establishing requirements and procedures for managing audit trails and security logs, ensuring alignment with local data protection laws and EU GDPR.
Audit Logging Policy
An Austrian-compliant policy establishing requirements and procedures for system audit logging, aligned with GDPR and local data protection laws.
Security Breach Notification Policy
An Austrian law-compliant policy document outlining mandatory procedures for data breach notification, response, and reporting under GDPR and local regulations.
Information Security Audit Policy
An Austrian law-compliant policy establishing procedures and requirements for information security audits, aligned with GDPR and DSG requirements.
Client Security Policy
An Austrian law-compliant security policy document establishing comprehensive information security controls and compliance requirements under Austrian and EU regulations.
Consent Security Policy
An Austrian law-compliant security policy for consent management, addressing GDPR and local data protection requirements.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.