Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Client Security Policy
"Need a Client Security Policy for our fintech startup in Singapore that handles sensitive payment data, with specific focus on cloud security controls and compliance with MAS guidelines, to be implemented by March 2025."
1. Purpose and Scope: Defines the objectives and applicability of the security policy
2. Definitions: Key terms and concepts used throughout the policy
3. Roles and Responsibilities: Defines who is responsible for various security aspects
4. Data Classification: Categories of data and their security requirements
5. Access Control: Rules for system and data access
6. Security Controls: Technical and organizational security measures
7. Incident Response: Procedures for handling security incidents
1. Cloud Security: Security requirements and controls specific to cloud services usage
2. Remote Working Security: Security measures and protocols for remote work arrangements
3. Industry-Specific Requirements: Additional security requirements for regulated industries such as finance or healthcare
1. Schedule 1: Security Controls Matrix: Detailed list of security controls and their implementation status
2. Schedule 2: Incident Response Procedures: Detailed procedures for different types of security incidents
3. Schedule 3: Data Classification Guidelines: Detailed guidelines for classifying different types of data
4. Schedule 4: Access Control Matrix: Detailed mapping of roles to access permissions
5. Schedule 5: Security Awareness Training Materials: Training materials and guidelines for staff
Authors
Authentication
Authorization
Breach
Client Data
Confidential Information
Cybersecurity Event
Data Classification
Data Protection Officer
Encryption
Information Asset
Information Security
Information System
Incident Response
Malware
Multi-Factor Authentication
Personal Data
Risk Assessment
Security Controls
Security Incident
Sensitive Data
Third Party
Threat
Vulnerability
Access Control
Information Classification
Security Controls
Incident Response
Physical Security
Network Security
Password Management
Acceptable Use
Monitoring and Auditing
Breach Notification
Risk Assessment
Compliance Requirements
Third-Party Management
Business Continuity
Disaster Recovery
Training and Awareness
Device Management
Change Management
Data Retention and Disposal
Enforcement and Penalties
Review and Updates
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.