Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Purpose and Scope: Defines the objectives and applicability of the policy
2. Definitions: Key terms used throughout the policy including technical terminology and compliance-related definitions
3. Email Usage Guidelines: Basic rules for appropriate email use, including acceptable and prohibited uses
4. Security Requirements: Mandatory security controls and practices including password requirements, encryption standards, and access controls
5. User Responsibilities: Specific responsibilities of employees regarding email security and proper usage
6. Monitoring and Privacy: Organization's rights regarding email monitoring and user privacy expectations
7. Compliance and Enforcement: Consequences of non-compliance and enforcement procedures
1. Industry-Specific Requirements: Additional requirements based on specific industry regulations (HIPAA, GLBA, FERPA, etc.)
2. International Data Transfer: Rules and requirements for cross-border email communications and international data protection standards
3. Mobile Device Usage: Specific requirements for accessing corporate email on mobile devices
4. Third-Party Email Services: Guidelines for using external email services and cloud-based email solutions
1. Schedule A - Email Security Best Practices: Detailed guidelines for secure email usage including password management, attachment handling, and phishing prevention
2. Schedule B - Incident Response Procedures: Step-by-step guide for handling email security incidents and data breaches
3. Schedule C - Acceptable Use Examples: Specific examples of acceptable and unacceptable email use cases
4. Schedule D - Security Configuration Standards: Technical specifications for email security settings, encryption requirements, and system configurations
5. Schedule E - Training Requirements: Mandatory security awareness training requirements and frequency
Find the exact document you need
Security Assessment And Authorization Policy
A U.S.-compliant framework document establishing procedures for security assessment and system authorization, aligned with federal and state regulations.
Phishing Policy
A U.S.-compliant policy document establishing guidelines and procedures for preventing and responding to phishing attacks within an organization.
Information Security Audit Policy
A U.S.-compliant policy document establishing procedures and requirements for conducting information security audits within an organization.
Email Encryption Policy
A U.S.-compliant policy document establishing requirements and procedures for email encryption within an organization.
Consent Security Policy
A U.S.-compliant policy document outlining security measures for handling consent-related data and records.
Security Audit Policy
A U.S.-compliant framework document establishing procedures and requirements for organizational security audits.
Email Security Policy
A policy document establishing email security guidelines and requirements for organizations operating in the United States.
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it