Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Purpose and Scope: Defines the objective of the policy and its applicability within the organization
2. Definitions: Clear explanations of technical terms, types of phishing attacks, and other relevant terminology
3. Legal Framework: Reference to relevant Swiss laws and regulations, including FADP/DSG and criminal code provisions
4. Roles and Responsibilities: Defines responsibilities for IT security team, management, and employees
5. Phishing Prevention Measures: Details of technical and organizational measures to prevent phishing attacks
6. Email Usage Guidelines: Specific rules and best practices for handling emails and suspicious messages
7. Incident Reporting Procedures: Step-by-step process for reporting suspected phishing attempts
8. Response Protocol: Procedures for handling confirmed phishing incidents
9. Training Requirements: Mandatory security awareness training and phishing simulation requirements
10. Compliance and Enforcement: Consequences of policy violations and enforcement measures
11. Policy Review and Updates: Frequency and process for reviewing and updating the policy
1. Industry-Specific Requirements: Additional requirements for regulated industries (e.g., banking, healthcare)
2. Remote Work Considerations: Special guidelines for employees working remotely or using personal devices
3. Third-Party Risk Management: Guidelines for managing phishing risks related to vendors and contractors
4. Social Media Guidelines: Specific guidance for preventing social media-based phishing attacks
5. Mobile Device Protection: Specific guidelines for preventing and handling phishing attempts on mobile devices
6. Cross-Border Data Considerations: Additional requirements for organizations handling international data transfers
1. Appendix A - Phishing Identification Checklist: Visual guide and checklist for identifying potential phishing attempts
2. Appendix B - Incident Response Flowchart: Visual representation of the incident response process
3. Appendix C - Reporting Templates: Standard forms for reporting phishing incidents
4. Appendix D - Training Materials: Reference materials and guidelines for security awareness training
5. Appendix E - Contact Information: List of key contacts for incident reporting and response
6. Appendix F - Technical Controls: Detailed technical specifications for email filtering and security controls
Find the exact document you need
Security Logging And Monitoring Policy
A Swiss-compliant policy document establishing requirements and procedures for security logging and monitoring activities, aligned with FADP/DSG requirements.
Security Assessment Policy
A Swiss-compliant security assessment framework outlining requirements and procedures for evaluating organizational security controls and ensuring regulatory compliance.
Audit Logging Policy
Swiss-compliant policy document establishing requirements and procedures for system and application audit logging, aligned with FADP/DSG and related regulations.
Phishing Policy
A Swiss-compliant internal policy document establishing guidelines and procedures for preventing and responding to phishing attacks, aligned with Swiss federal laws and data protection requirements.
Information Security Audit Policy
Swiss-compliant Information Security Audit Policy establishing requirements and procedures for security audits under Swiss federal data protection laws.
Client Security Policy
A Swiss law-governed security policy document establishing requirements and procedures for protecting client information and systems, aligned with FADP/DSG requirements.
Consent Security Policy
A Swiss law-compliant security policy for managing and protecting consent data, aligned with FADP/DSG requirements and EU GDPR principles.
Secure Sdlc Policy
A comprehensive policy document outlining secure software development lifecycle requirements and procedures, aligned with Swiss regulations and international security standards.
Security Audit Policy
A policy document outlining security audit requirements and procedures for organizations in Switzerland, ensuring compliance with Swiss data protection laws and security standards.
Email Security Policy
A Swiss-compliant email security policy document outlining requirements and procedures for secure email usage, aligned with FADP/DSG and related Swiss regulations.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)