Virus Protection Policy.docx
England and Wales
Free to use
🦠 Virus Protection Policy
A Virus Protection Policy explains procedures for preventing viruses from manifesting on computer systems and networks.use this template for free
Use this agreement when bringing an advisor on board to formalize variables such as job role and responsibilities, duration of contract and compensation. The agreement also sets forth certain key terms such as confidentiality and intellectual property.
This template is to be used the next time your company needs to set out terms with an individual (i.e. not to be used for agreements involving a personal service company as defined within IR35). It sets out the terms on which a contractor provides services to a client company, and is perfect for freelance software developers, marketing consultants, designers, PR/HR/recruitment consultants.
This is a senior employment agreement template that we at Genie AI have used to hire 20+ employees. The agreement is structured so that all the key commercial terms that would change per employee are kept at the bottom in a table in the schedule, to make it easy to use on an ongoing basis. Since this is a senior employment contract, it contains a significant amount of provisions for restrictive covenants, such as non-solicitation (enticing away of customers, business or employees after the employee has left) and non-compete clauses. There is also provision to make reference to an incentive scheme such as an EMI option scheme, however it is recommended to keep this in a separate agreement, in order to avoid a binding promise and avoid variations to the incentive scheme resulting in variations to the terms of employment. Apart from that this is a fairly simple agreement that is easy to use and repeat for many employees.
This Intern Agreement Letter is a binding legal contract, written as a simple letter to be more readable and amenable to an intern. The intern is treated as a contractor, not a full time employee. The letter contains the main provisions to hire an intern, such as salary and payment, holidays, who the manager will be and the work the intern will undertake.
This one way non disclosure agreement template is to be used in the UK for general commercial purposes. It was drafted from a neutral and fair perspective between the interests of the discloser and the recipient. It is also known as a One-way NDA or a One-wayconfidentiality agreement
This employment agreement (also known as an employment contract or service agreement) can be used when hiring a new member of staff to determine the key terms of employment including employment conditions, rights, responsibilities and duties of both the company and the employee.
Also known as a cloud security policy or cloud governance policy, this cloud computing policy template covers all external cloud services, e.g. cloud-based email, document storage, Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), etc. Personal accounts are excluded.
Cloud computing offers a number of advantages including low costs, high performance and quick delivery of services. However, without adequate controls, it also exposes individuals and organisations to online threats such as data loss or theft, unauthorised access to corporate networks, and so on.
You can remain committed to enabling your employees to do their jobs as efficiently as possible through the use of technology. This template is intended to establish a process employees can use cloud services as required without jeopardising your organisation's data and computing resources.
This policy applies to all employees of your organisation, with no exceptions.
A consultancy agreement between a company and a consultant. The client shall engage the consultant and the consultant shall provide the services on the terms of this agreement.This consultancy agreement can be used when hiring a contractor or consultant. It contains the usual terms around term, termination, payment and fees, expenses, confidential information and data protection. The agreement also handles intellectual property to ensure that IP of the work is transferred to the company paying for the consultant, how notices should be provided and whether the contract can be varied.
This policy is used to ensure the company's 3rd party suppliers (such as those providing technology software to the company) adhere to certain security standards as required by ISO27001 or SOC2 for instance. Everything after the Introduction can and should be copy and pasted into supplier legal agreements, or else the supplier agreements should reflect this policy. The company may not have such stringent requirements on suppliers processing non-critical data as defined by the company.
This Policy contains important rules covering the acceptable use of your organisation’s email, mobile, instant messaging, web browser and other online communication facilities. Your organisation provides facilities at its own expense and for its own business purposes, and it is the responsibility of all employees to make sure that any use of the internet follows your organisation’s standards of business and personal conduct.
Employees must ensure that they never use online facilities in a manner that could compromise your organisation or its employees in any way.
Every member of staff is responsible for ensuring that this Policy is complied with.
Laptops are especially vulnerable to physical damage, loss or theft, either for resale or for the information they contain. The impacts of breaches include not just the replacement value of the hardware but also the value of any data on them, or accessible information through them. Information is a vital asset. The Organisation depends very heavily on our computer systems to provide complete and accurate business information when and where we need it. The impacts of unauthorised access to or modification of important and/or sensitive data can far outweigh the cost of the equipment itself.
In order to ensure business continuity in the event of information on your systems being destroyed or corrupted, it is vital that your following systems are backed up regularly and reliably. In addition, it may be advisable to make and keep hard copies of certain information for future reference or confirmation. This template will help you to log these processes, and revisit and improve them on a regular basis.
Use this agreement when bringing an advisor on board to formalise variables such as job role and responsibilities, duration of contract and compensation. The agreement also sets forth certain key terms such as confidentiality and intellectual property.
This equal opportunities policy template commits your company to encouraging equality and diversity among your workforce and eliminating unlawful discrimination.
This policy template aims to enable your organisation to
1. Provide equality, fairness and respect across your employees, whether temporary, part-time or full-time.
2. Prevent unlawful discrimmination based on any characteristic protected under the Equality Act 2010, specifically, age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race (including colour, nationality, and ethnic or national origin), religion or belief, sex (gender) and sexual orientation.
3. Oppose and avoid all forms of unlawful discrimination. This includes in pay and benefits, terms and conditions of employment, dealing with grievances and discipline, dismissal, redundancy, leave for parents, requests for flexible working, and selection for employment, promotion, training or other developmental opportunities.
It should take less than 5 minutes to complete our questionnaire and the template can then be exported to any format you need in order to share with the other members of your organisation.
Articles of association are a multi-page document which outline agreed rules and restrictions relating to the way a company is governed, operated, and owned. Use this particular model from the BVCA if you would like to form an article to set out a company’s constitution and to govern the internal management of
company’s affairs. Note: These articles are subject to the requirements of the Companies Act 2006.
Use this Clean Desk and Clear Screen Policy template and remove the need to have a separate Clean Desk Policy and Clear Screen Policy. The clean desk policy will encourage employees in your organisation to reduce the threat of a security incident and of information loss. Further, a cleared screen helps to ensure that confidential information is not viewed on employee devices by unauthorised persons while away from their desk.
This Cryptographic Controls Policy details when encryption is required and how encryption keys (private and public) should be managed. It links to a Password Policy and Security Policy, which are typically other policies used as part of an overall Information Security Management System (ISMS), such as those required for ISO27001 and SOC2.
This grievance policy outlines how an employee can raise issues and grievances that may occur within the company. It outlines who they should let know, how to raise the issue and the procedure that would occur once the issue is raised. This document may be used in conjunction with the ISO27001 certification.
This Letter of Intent (LOI) can be used for any commercial transaction, such as confirming interest in a software product with a client. It is purposely kept lightweight and simple, where the key commercial terms can be filled in. It is not a legally binding document, but makes reference to a potentially future "Formal Agreement".