Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Purpose and Scope: Defines the objectives and applicability of the security policy
2. Definitions: Key terms used throughout the policy including technical, legal, and operational definitions
3. Consent Collection Procedures: Methods and requirements for obtaining valid consent, including timing, format, and documentation
4. Data Security Measures: Technical and organizational security controls for protecting consent-related data
5. Incident Response: Procedures for handling security breaches and consent violations
6. Compliance Requirements: Overview of applicable laws and regulations that must be followed
7. Roles and Responsibilities: Defines who is responsible for implementing and maintaining consent security measures
1. International Data Transfers: Procedures and safeguards for handling consent data across international borders
2. Special Categories of Data: Additional protections and procedures for sensitive data types such as health information, financial data, or children's data
3. Third-Party Management: Requirements for third-party vendors who may handle consent data
4. Data Retention and Disposal: Specific requirements for how long consent records should be kept and how they should be disposed of
1. Schedule A - Technical Security Controls: Detailed technical specifications for security measures including encryption standards, access controls, and monitoring requirements
2. Schedule B - Consent Forms and Templates: Standard templates for various types of consent collection including digital and physical formats
3. Schedule C - Incident Response Plan: Detailed step-by-step procedures for handling security incidents and breach notifications
4. Schedule D - Training Requirements: Comprehensive security awareness and training specifications for staff handling consent data
5. Schedule E - Compliance Checklist: Detailed checklist of all regulatory requirements and how they are addressed in the policy
Find the exact document you need
Security Assessment And Authorization Policy
A U.S.-compliant framework document establishing procedures for security assessment and system authorization, aligned with federal and state regulations.
Phishing Policy
A U.S.-compliant policy document establishing guidelines and procedures for preventing and responding to phishing attacks within an organization.
Information Security Audit Policy
A U.S.-compliant policy document establishing procedures and requirements for conducting information security audits within an organization.
Email Encryption Policy
A U.S.-compliant policy document establishing requirements and procedures for email encryption within an organization.
Consent Security Policy
A U.S.-compliant policy document outlining security measures for handling consent-related data and records.
Security Audit Policy
A U.S.-compliant framework document establishing procedures and requirements for organizational security audits.
Email Security Policy
A policy document establishing email security guidelines and requirements for organizations operating in the United States.
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it