Security Policy

Posted on 2011-09-13
Last Modified: 2012-05-12
is there any good material which can help to write an Organization's IT Related (ISO 27001) policies like Security Policy, Internet usage policy, media access policy etc.

1) is there any ready to go templates
2) have any body shared ISO 27001 related SAMPLE policies on internet.
Question by:osloboy
  • 3
  • 2

Expert Comment

ID: 36532187
Here is a start for different types of policies

Author Comment

ID: 36535771
thanks, what about professional  stuff

Expert Comment

ID: 36536297
what do you mean by professional stuff?
Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.


Author Comment

ID: 36537765
out of box, ready to go. like what you say about
LVL 62

Accepted Solution

btan earned 500 total points
ID: 36561257
As you clearly pointed out the link, you can find couple of template link for policy write up @

E.g The State of California Information Security Office released an Information Security Program Guide for State Agencies - in effect a guideline on implementing ISO/IEC 27002 for US government entities @

You can find out more samples from their official site (look at "Information Security Policy Templates", "Acceptable Use") @

btw, it is very close to NIST SP800-53. If you are interested, below is a link that shared template on mapping both @


Author Closing Comment

ID: 36579538

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
We need a new way to communicate time sensitive or critical info.   The best part of my role at xMatters is visiting our clients all over the world to learn about how they operate their businesses, share insights that xMatters has gleaned across…
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now