Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. 1. Purpose and Scope: Defines the objective of the policy and its applicability across the organization
2. 2. Definitions: Detailed explanations of technical terms, types of phishing attacks, and other relevant terminology
3. 3. Roles and Responsibilities: Outlines responsibilities of IT department, management, employees, and other stakeholders
4. 4. Phishing Prevention Measures: Details preventive controls, including email filtering, authentication protocols, and technical safeguards
5. 5. Employee Training Requirements: Specifies mandatory security awareness training programs and frequency
6. 6. Email Usage Guidelines: Specific rules for handling suspicious emails, links, and attachments
7. 7. Incident Reporting Procedures: Step-by-step process for reporting suspected phishing attempts
8. 8. Incident Response Plan: Procedures for responding to phishing attacks and data breaches
9. 9. Compliance Requirements: References to relevant laws and regulations, including IT Act requirements
10. 10. Policy Violations and Consequences: Disciplinary actions for non-compliance with the policy
11. 11. Review and Updates: Policy review frequency and update procedures
1. Remote Work Security Measures: Additional guidelines for remote workers; include if organization has remote workforce
2. Third-party Vendor Management: Guidelines for vendors accessing company systems; include if organization works with external vendors
3. Industry-Specific Requirements: Additional requirements for specific industries (e.g., financial services, healthcare); include based on industry
4. Social Media Guidelines: Specific guidelines for social media-based phishing; include if organization has significant social media presence
5. Mobile Device Security: Specific guidelines for mobile devices; include if organization has BYOD policy or mobile workforce
1. Appendix A: Phishing Response Flowchart: Visual representation of incident response procedures
2. Appendix B: Common Phishing Examples: Screenshots and examples of common phishing attempts for training purposes
3. Appendix C: Incident Report Template: Standard template for reporting phishing incidents
4. Appendix D: Contact Information: List of key contacts for incident reporting and response
5. Appendix E: Security Tools and Resources: List of approved security tools and resources available to employees
6. Appendix F: Training Schedule: Annual schedule of security awareness training sessions
Find the document you need
Security Logging And Monitoring Policy
An internal policy document outlining security logging and monitoring requirements for organizations in India, ensuring compliance with local IT and data protection regulations.
Phishing Policy
An internal policy document outlining anti-phishing measures and procedures for organizations in India, compliant with local cybersecurity regulations.
Vulnerability Assessment And Penetration Testing Policy
An internal policy document governing vulnerability assessment and penetration testing procedures, aligned with Indian cybersecurity laws and regulations.
IT Security Risk Assessment Policy
A governance document outlining IT security risk assessment procedures and requirements for organizations in India, aligned with local regulations and international standards.
Information Security Audit Policy
A comprehensive Information Security Audit Policy aligned with Indian IT laws and regulations, establishing procedures for conducting security audits and ensuring regulatory compliance.
Email Encryption Policy
An internal policy document governing email encryption requirements and procedures for organizations operating in India, ensuring compliance with local IT laws and security standards.
Consent Security Policy
A comprehensive policy document outlining consent management and security procedures under Indian data protection laws.
Email Security Policy
An internal policy document governing secure email usage and compliance with Indian IT and cybersecurity regulations.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
