Disaster Recovery Policy - Succinct DR policy from Imperial College, London. - http://www3.imperial.ac.uk/secretariat/policiesandpublications/disasterrecovery/policy/
Information Sensitivity Policy - Sample policy defining the assignment of sensitivity levels to information. - http://www.sans.org/resources/policies/Information_Sensitivity_Policy.pdf
Internet DMZ Equipment Policy - Sample policy defining the minimum requirement for all equipment located outside the corporate firewall. - http://www.sans.org/resources/policies/Internet_DMZ_Equipment_Policy.pdf
Server Security Policy - Defines standards for minimal security configuration for servers inside the organization's production network, or used in a production capacity. - http://www.sans.org/resources/policies/Server_Security_Policy.pdf
Third Party Connection Agreement - Sample agreement for establishing a connection to an external party. - http://www.sans.org/resources/policies/Third_Party_Agreement.pdf
Virtual Private Network Policy - Defines the requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network. - http://www.sans.org/resources/policies/Virtual_Private_Network.pdf
Wireless Communication Policy - Sample policy concerning the use of unsecured wireless communications technology. - http://www.sans.org/resources/policies/Wireless_Communication_Policy.pdf
Application Service Provider Policy - Security criteria for an ASP. - http://www.sans.org/resources/policies/Application_Service_Providers.pdf
Email Forwarding Policy - Email must not be forwarded automatically to an external destination without prior approval from the appropriate manager. - http://www.sans.org/resources/policies/Automatically_Forwarded_Email_Policy.pdf
Audit Policy - Defines requirements and provides authority for the information security team to conduct IT audits and risk assessments. - http://www.sans.org/resources/policies/Audit_Policy.pdf
Information Security Policies - The Information Security Toolkit from UCISA (University Colleges and Information Systems Association) contains a suite of security policy and guidance documents reflecting and cross-referenced against BS7799. [PDF documents] - http://www.ucisa.ac.uk/ist/agree/
Government Security Policy - The New Zealand Government's information security policy, based on the 2000 version of ISO/IEC 17799. [ZIP file containing PDF and MS Word versions] - http://www.security.govt.nz/sigs/sigs.zip
Password Policy - Defines standards for creating, protecting and changing strong passwords. [MS Word] - http://www.sans.org/resources/policies/Password_Policy.doc
Privacy Policy - Generic policy for websites offering goods and services, with an important warning to seek qualified legal advice in this area. - http://www.cbe.uidaho.edu/wegman/404/PRIVACY%20POLICY%20IVI%20Generic.htm
DMZ Security Policy - Sample policy establishing security requirements of equipment to be deployed in the corporate De-Militarized Zone. [MS Word] - http://www.sans.org/resources/policies/DMZ_Lab_Security_Policy.doc
Dial-in Access Policy - Policy regarding the use of dial-in connections to corporate networks. [MS Word] - http://www.sans.org/resources/policies/Dial-in_Access_Policy.doc
Router Security Policy - Sample policy establishing the minimum security requirements for all routers and switches connecting to production networks. [MS Word] - http://www.sans.org/resources/policies/Router_Security_Policy.doc
Remote Access Policy - Defines standards for connecting to a corporate network from any host. [MS Word] - http://www.sans.org/resources/policies/Remote_Access_Policy.doc
Risk Assessment Policy - Defines requirements and authorizes the information security team to identify, assess and remediate risks to the organization's information infrastructure. [MS Word] - http://www.sans.org/resources/policies/Risk_Assessment_Policy.doc
Database Password Policy - Defines requirements for securely storing and retrieving database usernames and passwords. [MS Word] - http://www.sans.org/resources/policies/DB_Credentials_Policy.doc
Internet Acceptable Use Policy - One page Acceptable Use Policy example. - http://www.ruskwig.com/docs/internet_policy.pdf
Personnel Security Policy - Example policy covering pre-employment screening, security policy training etc. - http://www.datasecuritypolicies.com/wp-content/uploads/2007/04/generic-personnel-security-policy.pdf
Network Security Policy - Example security policy for a data network from the University of Toronto. - http://www.utoronto.ca/security/documentation/policies/policy_5.htm
Physical Security Policy - Policy template by Walt Kobus defines requirements for physical access control to sensitive facilities and use of ID badges. - http://www.tess-llc.com/Physical%20Security%20PolicyV4.pdf
Data Classification Policy - Policy template by Walt Kobus describes the classification of information according to sensitivity (primarily confidentiality). - http://www.tess-llc.com/Data%20Classification%20PolicyV4.pdf
Resource Utilization Policy - Poilicy template by Walt Kobus defines requirements for resilience, redundancy and fault tolerance in information systems. - http://www.tess-llc.com/Resource%20Utilization%20PolicyV4.pdf
Information Data Ownership Policy - Policy template by Walt Kobus defines the roles and responsibilities of owners, custodians and users of information systems. - http://www.tess-llc.com/Information%20Data-Ownership%20PolicyV4.pdf
User Data Protection Policy - Policy template by Walt Kobus defines requirements for access controls, least privilege, integrity etc. to secure personal data. - http://www.tess-llc.com/User%20Data%20Protection%20PolicyV4.pdf
Identification and Authentication Policy - I&A policy template by Walt Kobus defines requirements for access control. - http://www.tess-llc.com/Identification%20&%20Authentication%20PolicyV4.pdf
Certification and Accreditation Policy - Policy template by Walt Kobus defines requirements and responsibilities for security assurance throughout the system development process. - http://www.tess-llc.com/Certification%20&%20Accreditation%20PolicyV4.pdf
Communications Policy - Datacommunications security policy template by Walt Kobus defines network security control requirements. - http://www.tess-llc.com/Communications%20PolicyV4.pdf
Cryptography Policy - Cryptographic policy template by Walt Kobus. - http://www.tess-llc.com/Cryptography%20PolicyV4.pdf
Security Audit Policy - Audit policy template by Walt Kobus. - http://www.tess-llc.com/Security%20Audit%20PolicyV4.pdf
Security Management Policy - General information security policy template by Walt Kobus. - http://www.tess-llc.com/Security%20Mngt%20PolicyV4.pdf
Extranet Policy - Defines the requirement that third party organizations requiring access to the organization's networks must sign a third-party connection agreement. [MS Word] - http://www.sans.org/resources/policies/Extranet_Policy.doc
Ethics Policy - Sample policy intended to 'establish a culture of openness, trust and integrity'. - http://www.sans.org/resources/policies/Ethics_Policy.doc
Email Retention Policy - Sample policy to help employees determine which emails should be retained and for how long. - http://www.sans.org/resources/policies/email_retention.doc
Laboratory Security Policy - Policy to secure confidential information and technologies in the labs and protect production services and the rest of the organization from lab activities. [MS Word] - http://www.sans.org/resources/policies/Internal_Lab_Security_Policy.doc
Acquisition Assessment Policy - Defines responsibilities regarding corporate acquisitions and the minimum requirements of an acquisition assessment to be completed by the information security group. [MS Word] - http://www.sans.org/resources/policies/Aquisition_Assessment_Policy.doc
Anti-Virus Policy - Requirements for effective virus detection and prevention. Written for a laboratory environment but easy to adapt for other settings. [MS Word] - http://www.sans.org/resources/policies/Lab_Anti-Virus_Policy.doc
Analog/ISDN Line Policy - Defines policy for analog/ISDN lines used for FAXing and data connections. - http://www.sans.org/resources/policies/Analog_Line_Policy.doc
Acceptable Use Policy - Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. [MS Word] - http://www.sans.org/resources/policies/Acceptable_Use_Policy.doc
Encryption Policy - Defines encryption algorithms that are suitable for use within the organization. [MS Word] - http://www.sans.org/resources/policies/Acceptable_Encryption_Policy.doc
Security Policy Primer - General advice for those new to writing information security policies. - http://www.sans.org/resources/policies/Policy_Primer.pdf
IT Security Policy - IT security policy example/how-to guide from Enterprise Ireland. - http://www.enterprise-ireland.com/ebusinesssite/guides/internal_security/internal_security_index.asp
HSPD-12 Privacy Policy - Sample privacy policy including Privacy Act systems of records notices, Privacy Act statements and a privacy impact assessment, designed to satisfy the requirements of HSPD-12 “Policy for a Common Identification Standard for Federal Employees and Contra - http://www.whitehouse.gov/omb/memoranda/fy2006/m06-06_att.doc
Network Security Policy Guide - Watchguard's guide to creating an overarching network information security policy, supported by subsidiary policies. - http://www.watchguard.com/docs/whitepaper/securitypolicy_wp.pdf
Modem Policy - Sample policy from Sandstorm, designed as an addition to an existing Remote Access Policy, if one exists, or simply to stand alone. - http://www.sandstorm.net/products/phonesweep/modempolicy.php
Information Security Policy - An information security policy from the University of Illinois. - http://www.obfs.uillinois.edu/manual/central_p/sec19-5.html
Telecommuting/Teleworking Policy - Sample policy on teleworking covering employment as well as information security issues. - http://www.womans-work.com/teleworking_policy.htm
K-20 Network Acceptable Use Policy - Policy on acceptable use of a school network, along with information for parents and an informed consent form. Developed in Washington State. - http://www.k12.wa.us/K-20/AUPSchBoardNetworkUse.aspx
IP Network Security Policy - Example security policy to demonstrate policy writing techniques introduced in three earlier articles. - http://www.securityfocus.com/infocus/1497
ISO 27001 Policies - Typical headings for a security policy aligned broadly with the ISO/IEC standard for information security management systems. - http://www.27001-online.com/secpols.htm
Company Email Policy - A menu of clauses suitable for email acceptable use policies. - http://www.cli.org/emailpolicy/top.html
Use of Electronic Mail - Policy from the University of Colorado on the use of, access to, and disclosure of electronic mail. - http://www.cusys.edu/~policies/General/email.html