Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Purpose and Scope: Defines the objective of the security assessment policy and its application scope within the organization
2. Definitions and Terminology: Clear definitions of technical terms, roles, and concepts used throughout the policy
3. Legal Framework and Compliance: Overview of relevant Swiss laws, regulations, and standards that the policy addresses
4. Roles and Responsibilities: Detailed description of responsibilities for all parties involved in security assessments
5. Assessment Requirements: Mandatory security assessment procedures, frequency, and coverage areas
6. Assessment Methodology: Standardized approaches and methods for conducting security assessments
7. Risk Classification: Framework for categorizing and prioritizing security risks
8. Documentation Requirements: Standards for recording, reporting, and maintaining assessment records
9. Incident Response Integration: Connection between security assessments and incident response procedures
10. Reporting and Communication: Protocols for communicating assessment findings and recommendations
11. Review and Update Procedures: Process for periodic review and updating of the policy
1. Cloud Security Assessment: Specific requirements for cloud service security assessments, needed when organization uses cloud services
2. Third-Party Assessment: Procedures for assessing external service providers, required when organization relies on third-party vendors
3. Financial Services Special Requirements: Additional requirements for financial institutions subject to FINMA regulations
4. Cross-border Data Transfer Assessment: Special considerations for international data transfers, needed for organizations operating internationally
5. Industry-Specific Controls: Additional controls for specific industries (healthcare, insurance, etc.)
6. Remote Working Security: Special considerations for assessing security in remote working environments
1. Assessment Checklist Template: Standardized checklist for conducting security assessments
2. Risk Assessment Matrix: Template for risk evaluation and classification
3. Compliance Requirements Mapping: Detailed mapping of Swiss regulatory requirements to assessment criteria
4. Security Controls Framework: Comprehensive list of security controls to be assessed
5. Report Template: Standardized template for assessment reporting
6. Remediation Timeline Framework: Guidelines for addressing identified security issues
7. Third-Party Assessment Questionnaire: Standard questionnaire for vendor security assessments
Find the exact document you need
Security Logging And Monitoring Policy
A Swiss-compliant policy document establishing requirements and procedures for security logging and monitoring activities, aligned with FADP/DSG requirements.
Security Assessment Policy
A Swiss-compliant security assessment framework outlining requirements and procedures for evaluating organizational security controls and ensuring regulatory compliance.
Audit Logging Policy
Swiss-compliant policy document establishing requirements and procedures for system and application audit logging, aligned with FADP/DSG and related regulations.
Phishing Policy
A Swiss-compliant internal policy document establishing guidelines and procedures for preventing and responding to phishing attacks, aligned with Swiss federal laws and data protection requirements.
Information Security Audit Policy
Swiss-compliant Information Security Audit Policy establishing requirements and procedures for security audits under Swiss federal data protection laws.
Client Security Policy
A Swiss law-governed security policy document establishing requirements and procedures for protecting client information and systems, aligned with FADP/DSG requirements.
Consent Security Policy
A Swiss law-compliant security policy for managing and protecting consent data, aligned with FADP/DSG requirements and EU GDPR principles.
Secure Sdlc Policy
A comprehensive policy document outlining secure software development lifecycle requirements and procedures, aligned with Swiss regulations and international security standards.
Security Audit Policy
A policy document outlining security audit requirements and procedures for organizations in Switzerland, ensuring compliance with Swiss data protection laws and security standards.
Email Security Policy
A Swiss-compliant email security policy document outlining requirements and procedures for secure email usage, aligned with FADP/DSG and related Swiss regulations.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)