Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Purpose and Scope: Defines the objective of the policy and its applicability to different stakeholders within the organization
2. Definitions: Explains key terms including phishing, spear phishing, whaling, social engineering, and other relevant cybersecurity terminology
3. Legal Framework: References to relevant Indonesian laws and regulations, particularly the ITE Law and PDP Law
4. Roles and Responsibilities: Outlines the responsibilities of employees, IT department, management, and security teams in preventing and responding to phishing attempts
5. Phishing Prevention Guidelines: Detailed guidelines on identifying suspicious emails, links, and attachments, including common red flags and warning signs
6. Email and Communication Security: Specific rules for handling electronic communications, including email usage, verification procedures, and safe communication practices
7. Incident Reporting Procedures: Step-by-step procedures for reporting suspected phishing attempts and security incidents
8. Response Protocol: Procedures for handling confirmed phishing incidents, including containment, investigation, and recovery steps
9. Training Requirements: Mandatory security awareness training requirements and frequency for all employees
10. Compliance and Enforcement: Consequences of policy violations and enforcement mechanisms
1. Remote Work Security: Additional guidelines for remote workers, used when organization has remote or hybrid work arrangements
2. Industry-Specific Requirements: Additional requirements for specific industries (e.g., financial services, healthcare), used when organization operates in regulated sectors
3. Third-Party Risk Management: Guidelines for managing phishing risks related to third-party vendors and contractors, used when organization heavily relies on external parties
4. Mobile Device Guidelines: Specific guidelines for mobile devices and applications, used when organization has BYOD policy or mobile workforce
5. Social Media Security: Guidelines for protecting against social media-based phishing attacks, used when social media use is significant in organization
1. Appendix A: Phishing Response Flowchart: Visual representation of the incident response process
2. Appendix B: Common Phishing Examples: Screenshots and examples of typical phishing attempts for training purposes
3. Appendix C: Reporting Templates: Standard forms and templates for reporting phishing incidents
4. Appendix D: Contact Information: List of key contacts for incident reporting and response
5. Appendix E: Security Tools Guide: Guide to using organization-approved security tools and software
Find the exact document you need
Security Assessment And Authorization Policy
An Indonesian-compliant security assessment and authorization policy document that establishes framework and procedures for organizational security governance under local regulations.
Phishing Policy
An internal policy document outlining phishing prevention and response procedures for organizations in Indonesia, ensuring compliance with local cybersecurity laws.
Email Encryption Policy
An Indonesian law-compliant policy document establishing email encryption standards and procedures for organizational email communications.
Secure Sdlc Policy
An Indonesian-compliant policy document establishing security requirements and controls for the entire software development lifecycle, aligned with local regulations including PDP Law and BSSN guidelines.
Security Audit Policy
Comprehensive security audit policy framework aligned with Indonesian regulations, including PDP Law and BSSN guidelines, for systematic security assessment and compliance.
Email Security Policy
An internal policy document outlining email security requirements and guidelines for organizations in Indonesia, ensuring compliance with local data protection and electronic transaction laws.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)
.png)