Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Purpose and Scope: Defines the objectives of the policy and its applicability within the organization
2. Definitions: Clear definitions of technical terms, roles, and concepts used throughout the policy
3. Policy Statement: Overall statement of the organization's commitment to regular security audits and compliance
4. Roles and Responsibilities: Defines key stakeholders and their responsibilities in the audit process
5. Audit Frequency and Scheduling: Establishes the required frequency of different types of security audits and scheduling procedures
6. Audit Types and Scope: Details the different types of security audits and their respective scopes
7. Audit Methodology: Standard procedures and methodologies to be followed during security audits
8. Documentation Requirements: Specifies required documentation before, during, and after audits
9. Reporting and Communication: Procedures for reporting audit findings and communicating with stakeholders
10. Non-Compliance and Remediation: Processes for handling audit findings and implementing corrective actions
11. Confidentiality and Data Protection: Requirements for protecting sensitive information during and after audits
12. Policy Review and Updates: Procedures for reviewing and updating the audit policy
1. Regulatory Compliance: Specific section for organizations in regulated industries (e.g., financial services, healthcare) detailing additional compliance requirements
2. Third-Party Auditors: Section needed when external auditors are used, defining requirements and procedures for engaging third-party audit services
3. Cloud Services Audit: Required for organizations using cloud services, specifying additional audit requirements for cloud environments
4. Remote Systems Audit: Needed for organizations with remote work arrangements or distributed systems
5. Business Continuity Integration: Optional section linking security audits to business continuity and disaster recovery planning
6. Special Circumstances: Procedures for conducting emergency audits or investigations in response to security incidents
1. Audit Checklist Template: Standard checklist template for different types of security audits
2. Risk Assessment Matrix: Framework for evaluating and categorizing audit findings
3. Audit Report Template: Standardized template for documenting audit results and recommendations
4. Technical Control Requirements: Detailed technical specifications and control requirements for different systems
5. Compliance Requirements: Detailed listing of relevant regulatory requirements and compliance standards
6. Incident Response Integration: Procedures linking audit findings to incident response processes
7. Role Authorization Matrix: Detailed matrix of roles and their authorized access levels during audits
Find the document you need
Confidentiality Non Disclosure Agreement
A Hong Kong law-governed confidentiality agreement protecting sensitive information shared between parties during business relationships and negotiations.
Client Risk Assessment Form
A regulatory-compliant risk assessment form for evaluating client profiles in Hong Kong's financial services sector, meeting HKMA and SFC requirements.
Synthetic Letter Of Credit
A Hong Kong law-governed document establishing the terms and conditions for a Synthetic Letter of Credit, combining traditional LC mechanics with synthetic elements.
Ceiling Leakage Complaint Letter
A formal complaint letter under Hong Kong law addressing ceiling leakage issues and requesting remedial action from responsible parties.
Security Contract Termination Letter
A Hong Kong law-governed letter formally terminating a security services contract, addressing notice periods, settlements, and transition arrangements.
Information Security Audit Policy
A policy document outlining information security audit requirements and procedures for organizations in Hong Kong, aligned with PDPO and local regulations.
Security Loan Agreement
A Hong Kong law-governed agreement establishing terms for temporary transfer of securities between parties, including collateral arrangements and regulatory compliance requirements.
Physical Power Purchase Agreement
Hong Kong-governed agreement for physical electricity sale and purchase between generator and offtaker, addressing technical, operational, and commercial terms.
Law Firm Partnership Agreement
A Hong Kong law-governed agreement establishing the partnership structure and operational framework for a law firm, detailing partner rights, obligations, and management arrangements.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
