Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Purpose and Scope: Defines the objectives of the policy and its applicability to different users and systems within the organization
2. Policy Statement: High-level statement of the organization's position on email security and commitment to protecting information assets
3. Definitions: Clear explanations of technical terms and concepts used throughout the policy
4. User Responsibilities: Detailed outline of employee obligations and expected behavior regarding email usage
5. Email Usage Guidelines: Specific rules and best practices for email composition, sending, and management
6. Security Requirements: Technical and procedural requirements for secure email usage, including encryption and authentication
7. Data Protection and Privacy: Requirements for handling personal and confidential information in compliance with Swiss data protection laws
8. Incident Reporting: Procedures for reporting security incidents, suspicious emails, and potential breaches
9. Compliance and Enforcement: Consequences of policy violations and enforcement procedures
10. Policy Review and Updates: Process and frequency for reviewing and updating the policy
1. Remote Work Email Security: Additional security requirements for employees accessing email systems remotely, recommended when organization supports remote work
2. International Email Communications: Special requirements for cross-border email communications, needed when organization operates internationally
3. Email Retention and Archiving: Specific requirements for email retention periods and archiving procedures, recommended for regulated industries
4. Mobile Device Email Access: Security requirements for accessing email on mobile devices, needed when organization allows mobile email access
5. Department-Specific Requirements: Additional requirements for specific departments handling sensitive information (e.g., HR, Legal, Finance)
1. Appendix A: Acceptable Use Guidelines: Detailed guidelines for acceptable email use, including examples of appropriate and inappropriate behavior
2. Appendix B: Email Security Best Practices: Comprehensive list of security best practices and tips for users
3. Appendix C: Incident Response Procedures: Step-by-step procedures for handling different types of email security incidents
4. Appendix D: Email Configuration Standards: Technical standards for email client configuration and security settings
5. Appendix E: Email Security Compliance Checklist: Checklist for users to verify compliance with key policy requirements
6. Appendix F: Authorized Email Systems and Tools: List of approved email systems, security tools, and encryption methods
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
