Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Purpose and Scope: Defines the objectives of the policy and its applicability to different users and systems within the organization
2. Policy Statement: High-level statement of the organization's position on email security and commitment to protecting information assets
3. Definitions: Clear explanations of technical terms and concepts used throughout the policy
4. User Responsibilities: Detailed outline of employee obligations and expected behavior regarding email usage
5. Email Usage Guidelines: Specific rules and best practices for email composition, sending, and management
6. Security Requirements: Technical and procedural requirements for secure email usage, including encryption and authentication
7. Data Protection and Privacy: Requirements for handling personal and confidential information in compliance with Swiss data protection laws
8. Incident Reporting: Procedures for reporting security incidents, suspicious emails, and potential breaches
9. Compliance and Enforcement: Consequences of policy violations and enforcement procedures
10. Policy Review and Updates: Process and frequency for reviewing and updating the policy
1. Remote Work Email Security: Additional security requirements for employees accessing email systems remotely, recommended when organization supports remote work
2. International Email Communications: Special requirements for cross-border email communications, needed when organization operates internationally
3. Email Retention and Archiving: Specific requirements for email retention periods and archiving procedures, recommended for regulated industries
4. Mobile Device Email Access: Security requirements for accessing email on mobile devices, needed when organization allows mobile email access
5. Department-Specific Requirements: Additional requirements for specific departments handling sensitive information (e.g., HR, Legal, Finance)
1. Appendix A: Acceptable Use Guidelines: Detailed guidelines for acceptable email use, including examples of appropriate and inappropriate behavior
2. Appendix B: Email Security Best Practices: Comprehensive list of security best practices and tips for users
3. Appendix C: Incident Response Procedures: Step-by-step procedures for handling different types of email security incidents
4. Appendix D: Email Configuration Standards: Technical standards for email client configuration and security settings
5. Appendix E: Email Security Compliance Checklist: Checklist for users to verify compliance with key policy requirements
6. Appendix F: Authorized Email Systems and Tools: List of approved email systems, security tools, and encryption methods
Find the exact document you need
Security Logging And Monitoring Policy
A Swiss-compliant policy document establishing requirements and procedures for security logging and monitoring activities, aligned with FADP/DSG requirements.
Security Assessment Policy
A Swiss-compliant security assessment framework outlining requirements and procedures for evaluating organizational security controls and ensuring regulatory compliance.
Audit Logging Policy
Swiss-compliant policy document establishing requirements and procedures for system and application audit logging, aligned with FADP/DSG and related regulations.
Phishing Policy
A Swiss-compliant internal policy document establishing guidelines and procedures for preventing and responding to phishing attacks, aligned with Swiss federal laws and data protection requirements.
Information Security Audit Policy
Swiss-compliant Information Security Audit Policy establishing requirements and procedures for security audits under Swiss federal data protection laws.
Client Security Policy
A Swiss law-governed security policy document establishing requirements and procedures for protecting client information and systems, aligned with FADP/DSG requirements.
Consent Security Policy
A Swiss law-compliant security policy for managing and protecting consent data, aligned with FADP/DSG requirements and EU GDPR principles.
Secure Sdlc Policy
A comprehensive policy document outlining secure software development lifecycle requirements and procedures, aligned with Swiss regulations and international security standards.
Security Audit Policy
A policy document outlining security audit requirements and procedures for organizations in Switzerland, ensuring compliance with Swiss data protection laws and security standards.
Email Security Policy
A Swiss-compliant email security policy document outlining requirements and procedures for secure email usage, aligned with FADP/DSG and related Swiss regulations.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
