This document covers how data is encrypted in the organisation. Also, it provides a reference for internal and external readers to understand the cryptographic controls in place.
This is how data in transit, as rest and in use are encrypted and the methods used.
Covering the above as well as governance and processes for different data types. More specific encryption methodologies in place and classification rules.
If your organisation has more complex encryption methods, or they change and span a wide range of data storage we will create a fully bespoke policy. Other examples are if data is encrypted and decrypted by third parties, secrets storage and retrieval by third parties. Also, how these intersect with the controller and processor rules as well as data landscape mapping if required.
We create a range of standard, custom or fully bespoke IT Security policies for your company – please see some examples here and click the button to request a quote.
We write policy and procedure documents for your company and perform business analysis services enabling you to stay efficient, compliant and improve quality. We also offer consultancy services for accreditation and bidding. Our services span all company sizes and sectors. If you have requirements that are not covered on the website, please let us know.
Copyright © 2020 - 2024 Policy Pros - Part of Project Analysis UK Limited. Cookie Policy