Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your documents don't train Genie's AI
You keep IP ownership of your documents
Records Retention Policy
I need a records retention policy that complies with GDPR and local regulations, specifying retention periods for different types of business documents and electronic records.
What kind of document are you looking for?
Anti-Slavery and Human trafficking Policy
Use this template to create a Anti-Slavery and Human trafficking Policy that complies with United States federal law
Anti Bribery and Corruption Policy
Use this template to create a Anti Bribery and Corruption Policy that complies with United States federal law
Affidavit of Loss
Use this template to create a Affidavit of Loss that complies with United States federal law
Acceptable Use Policy
Use this template to create a Acceptable Use Policy that complies with United States federal law
Audit Procedure
Use this template to create a Audit Procedure that complies with United States federal law
Certificate of Authority
Use this template to create a Certificate of Authority that complies with United States federal law
Cease and Desist Order
Use this template to create a Cease and Desist Order that complies with United States federal law
Certificate of Authorization
Use this template to create a Certificate of Authorization that complies with United States federal law
Change Management Process
Use this template to create a Change Management Process that complies with United States federal law
Certification Statement
Use this template to create a Certification Statement that complies with United States federal law
Cloud Computing Policy
Use this template to create a Cloud Computing Policy that complies with United States federal law
Complaints Policy
Use this template to create a Complaints Policy that complies with United States federal law
Code of Conduct
Use this template to create a Code of Conduct that complies with United States federal law
Conciliation Agreement
Use this template to create a Conciliation Agreement that complies with United States federal law
Clear Desk Policy
Use this template to create a Clear Desk Policy that complies with United States federal law
Records Retention Policy
Use this template to create a Records Retention Policy that complies with United States federal law
Data Protection Agreement
Use this template to create a Data Protection Agreement that complies with United States federal law
Consent Letter
Use this template to create a Consent Letter that complies with United States federal law
Conflict of Interest Policy
Use this template to create a Conflict of Interest Policy that complies with United States federal law
Cybersecurity Policy
Use this template to create a Cybersecurity Policy that complies with United States federal law
Data Breach Response Policy
Use this template to create a Data Breach Response Policy that complies with United States federal law
Contract Amendment
Use this template to create a Contract Amendment that complies with United States federal law
Data Breach Response Plan
Use this template to create a Data Breach Response Plan that complies with United States federal law
Data Processing Notice
Use this template to create a Data Processing Notice that complies with United States federal law
Data Protection Policy
Use this template to create a Data Protection Policy that complies with United States federal law
Data Retention Policy
Use this template to create a Data Retention Policy that complies with United States federal law
Data Protection Addendum
Use this template to create a Data Protection Addendum that complies with United States federal law
Declaration Form
Use this template to create a Declaration Form that complies with United States federal law
Environmental, Social and Governance Compliance Framework
Use this template to create a Environmental, Social and Governance Compliance Framework that complies with United States federal law
Data Sharing Agreement
Use this template to create a Data Sharing Agreement that complies with United States federal law
Disclosure Statement
Use this template to create a Disclosure Statement that complies with United States federal law
Expense Policy
Use this template to create a Expense Policy that complies with United States federal law
Equal Employment Opportunity Request
Use this template to create a Equal Employment Opportunity Request that complies with United States federal law
Due Diligence Policy
Use this template to create a Due Diligence Policy that complies with United States federal law
Incident and Non-Conformance Management Policy
Use this template to create a Incident and Non-Conformance Management Policy that complies with United States federal law
IT Security Policy
Use this template to create a IT Security Policy that complies with United States federal law
Inspection Report
Use this template to create a Inspection Report that complies with United States federal law
Incident and Non-Conformance Management Form
Use this template to create a Incident and Non-Conformance Management Form that complies with United States federal law
Anti-Facilitation of Tax Evasion Policy
Use this template to create a Anti-Facilitation of Tax Evasion Policy that complies with United States federal law
Method Statement
Use this template to create a Method Statement that complies with United States federal law
Information Security Policy
Use this template to create a Information Security Policy that complies with United States federal law
Non-Disclosure Agreement
Use this template to create a Non-Disclosure Agreement that complies with United States federal law
Incident Report
Use this template to create a Incident Report that complies with United States federal law
Password Policy
Use this template to create a Password Policy that complies with United States federal law
Professional License
Use this template to create a Professional License that complies with United States federal law
Security Policy
Use this template to create a Security Policy that complies with United States federal law
Social Media Policy
Use this template to create a Social Media Policy that complies with United States federal law
Subject Access Request
Use this template to create a Subject Access Request that complies with United States federal law
Whistleblower Protection Policy
Use this template to create a Whistleblower Protection Policy that complies with United States federal law
Workplace Policy
Use this template to create a Workplace Policy that complies with United States federal law
Whistleblower Policy
Use this template to create a Whistleblower Policy that complies with United States federal law
Find the exact document you need
It Usage Policy
A U.S.-compliant policy document defining acceptable use and security requirements for organizational IT resources.
It Aup
A U.S.-compliant policy document outlining acceptable use of organizational IT resources and systems.
It Appropriate Use Policy
A U.S.-compliant policy document establishing guidelines for proper use of organizational IT resources and systems.
It Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT resources and systems, including security protocols and user responsibilities.
Isp Acceptable Use Policy
A U.S.-compliant legal document defining rules and restrictions for using an ISP's network and services.
Hospital Acceptable Use Policy
A U.S.-compliant policy document governing the appropriate use of hospital information systems and technology resources while ensuring HIPAA compliance.
Financial Analytical Review
A U.S.-governed agreement establishing terms for professional financial analysis services, compliant with SEC and FINRA regulations.
Final Analytical Review
A comprehensive analysis of financial statements and performance indicators prepared under U.S. accounting standards and regulations.
Factual Findings Audit Report
A U.S.-compliant report documenting specific findings from agreed-upon procedures performed by an independent auditor under AICPA standards.
External Audit Manual
A regulatory-compliant guide for conducting external audits in the United States, aligned with federal and state requirements.
External Confirmation Audit
A U.S.-compliant document used by auditors to obtain third-party verification of financial information during audit procedures.
Checking Vouching And Audit Report
A U.S.-compliant audit report detailing the examination and verification of financial records and transactions.
Cash Verification In Bank Audit
A U.S. regulatory-compliant document recording the verification of physical cash holdings during bank audits.
Cash Count Audit Report
A US-compliant document recording and verifying cash counts in business operations, meeting federal audit requirements.
Aup Network
A U.S.-compliant policy document defining acceptable use rules and guidelines for organizational network access and usage.
Authorized Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT resources and systems.
Authorization Letter For Affidavit Of Loss
A U.S. legal document authorizing someone to execute an affidavit of loss on behalf of another party.
Aup Software
A U.S.-governed legal document defining acceptable and prohibited uses of software systems, including user responsibilities and compliance requirements.
Aup Security
A U.S.-compliant policy document defining acceptable use and security requirements for organizational IT resources.
Workplace Acceptable Use Policy
A U.S.-compliant policy document establishing guidelines for acceptable use of company IT resources and systems.
Wireless Use Policy
A U.S.-compliant policy document establishing rules and requirements for wireless network usage within an organization.
Wireless Acceptable Use Policy
A U.S.-compliant policy document that governs the acceptable use of an organization's wireless network infrastructure and resources.
Website Acceptable Use Policy
A legal document governing website usage terms and conditions in the US, establishing rules for users while protecting the website owner's interests.
Use Policy
A legally binding document outlining terms and conditions for service usage under US law.
Use Of Technology Policy
A legally compliant framework for technology usage in US organizations, establishing guidelines for appropriate use of digital resources and systems.
Unacceptable Use Policy
A US-jurisdiction document that defines prohibited activities and behaviors when using a service or platform.
Transaction Testing Internal Audit
A U.S.-compliant internal audit document that evaluates and documents transaction-related controls and processes within an organization.
Test Of Control And Substantive Test
A U.S.-compliant audit document that combines control testing and substantive testing procedures to evaluate internal controls and verify transaction accuracy.
Technology Use Policy For Employees
A U.S.-compliant policy document that establishes guidelines and requirements for employee use of company technology resources.
Technology Use Policy
A U.S.-compliant policy document governing the use of organizational technology resources and systems.
Sworn Affidavit For Lost Documents
A legally binding sworn statement used in the U.S. to formally declare the loss of important documents and request replacements.
Sworn Affidavit & Proof Of Loss Statement
A legally binding U.S. document used to formally declare insurance losses under oath, typically requiring notarization.
Surprise Cash Count Audit Report
A U.S. regulatory document recording the results of an unannounced cash count procedure and associated findings.
Substantive Testing In It Audit
A U.S.-compliant framework for conducting substantive testing in IT audits, aligned with federal and state regulations.
Substantive Audit
A U.S.-governed agreement establishing terms for conducting detailed financial statement testing and account balance verification.
Substantive Analytics Audit
A U.S.-governed contract establishing terms for professional examination of organizational data analytics processes and outputs.
Standard Acceptable Use Policy
A U.S.-compliant legal document defining rules and guidelines for acceptable use of services, networks, or platforms.
Staff Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT resources and systems by staff members.
Sop For Internal Audit In Food Industry
A US-compliant SOP document outlining procedures for conducting internal audits in food industry facilities, ensuring FDA and FSMA compliance.
Sop For Internal Audit Department
A standardized procedure document governing internal audit operations in compliance with U.S. regulations and professional standards.
Sop Compliance Audit
A U.S.-compliant framework for evaluating adherence to standard operating procedures and regulatory requirements.
Security Aup
A U.S.-governed policy document that defines acceptable use of organizational IT resources and security requirements for all system users.
Security Acceptable Use Policy
A policy document outlining acceptable use of organizational IT systems and security requirements, compliant with US regulations.
Revenue Audit Manual
A standardized guide for revenue audit procedures in compliance with U.S. federal and state regulations.
Responsible Use Policy
A US-compliant policy document that establishes guidelines for appropriate use of organizational IT resources and systems.
Responsible Internet Use Policy
A policy document outlining acceptable internet use guidelines and responsibilities within an organization, compliant with US federal and state regulations.
Resource Usage Policy
A U.S.-compliant policy document establishing guidelines for organizational resource usage and management.
Request Letter For Affidavit Of Loss
A formal request document used in the United States to obtain an official declaration confirming the loss of an important document or instrument.
Removable Media Acceptable Use Policy
A U.S.-compliant policy document governing the use of portable storage devices and removable media within an organization.
Remote Access Acceptable Use Policy
A US-compliant policy document establishing guidelines and requirements for secure remote access to organizational systems and data.
Preliminary Analytical Review
A U.S.-compliant preliminary analysis document used in audit planning to identify potential risk areas and unusual transactions.
Network Use Policy
A legally binding document establishing guidelines for acceptable network use in U.S. organizations, compliant with federal and state regulations.
Network Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational network resources and infrastructure.
Mobile Phone Acceptable Use Policy
A U.S.-compliant policy document establishing guidelines for mobile device usage within organizations, including security, privacy, and compliance requirements.
Library Acceptable Use Policy
A U.S.-compliant policy document establishing rules and guidelines for library facility and resource usage.
Inventory Audit Plan
A U.S.-compliant framework document outlining procedures and requirements for conducting systematic inventory audits.
Internet Use Policy For Schools
A U.S.-compliant policy document establishing guidelines for internet usage in educational institutions, ensuring student safety and legal compliance.
Internet Use Policies
A US-compliant policy document establishing rules and guidelines for organizational internet usage and system access.
Internet And Email Acceptable Use Policy
A U.S.-compliant policy document establishing guidelines for appropriate use of organizational internet and email systems.
Internet Acceptable Use Policy For Employees
A U.S.-compliant policy document that governs employee internet and IT system usage within organizations, establishing guidelines and protecting company assets.
Internal Audit Test Plan
A U.S.-compliant document outlining the methodology and procedures for conducting internal audits within an organization.
Internal Audit Test Of Controls
A U.S.-compliant document outlining procedures for testing and evaluating organizational internal controls under SOX and PCAOB standards.
Internal Audit Test
A U.S.-compliant testing protocol for evaluating internal controls and processes within organizations.
Internal Audit Substantive Testing
A US-compliant testing protocol for internal auditors to verify financial and operational accuracy through structured substantive testing procedures.
Internal Audit Policy Manual
A comprehensive guide establishing internal audit procedures and compliance requirements for U.S. organizations, aligned with federal regulations and IIA standards.
Internal Audit Policies
A governance document establishing internal audit framework and procedures in compliance with U.S. federal and state regulations.
Infosec Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT resources and security requirements.
Information Security Acceptable Use Standard
A U.S.-compliant standard defining acceptable use of information systems and data security requirements within an organization.
Information Security Acceptable Use Policy
A U.S.-compliant policy document establishing rules and guidelines for acceptable use of organizational IT resources and information security practices.
Ict Usage Policy
A U.S.-compliant policy document governing the use of organization's ICT resources and establishing user responsibilities.
Ict Acceptable Use Policy In The Workplace
A U.S.-compliant policy document defining acceptable use of company ICT resources and systems in the workplace.
Ethical Computer Use Policy
A U.S.-compliant policy document establishing guidelines for appropriate use of organizational computer systems and digital resources.
Employee Internet Usage Policy
A US-compliant policy document that governs employee internet usage in the workplace, establishing guidelines and protecting both employer and employee rights.
Employee Aup
A U.S.-compliant policy document that establishes guidelines for employee use of organization's IT resources and systems.
Email And Internet Usage Policy
A U.S.-compliant policy document establishing guidelines for workplace email and internet usage, including security protocols and acceptable use standards.
Electronic Usage Policy
A U.S.-compliant policy document establishing guidelines for the acceptable use of electronic systems and resources within an organization.
Cybersecurity Acceptable Use Policy Aup
A U.S.-compliant policy document defining acceptable use of organizational IT resources and security requirements.
Cyber Security Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT systems and security requirements.
Corporate Internet Use Policy
A U.S.-compliant policy document establishing guidelines for employee internet usage and digital resource management within organizations.
Corporate Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of company IT resources and systems.
Computer Use Policy
A U.S.-compliant policy document establishing guidelines for appropriate use of organizational computer systems and electronic resources.
Computer And Email Acceptable Use Policy
A U.S.-compliant policy document governing the acceptable use of organizational computer systems and email resources.
Compliance Audit Manual
A standardized guide for conducting organizational compliance audits under U.S. federal and state regulations.
Company Internet Usage Policy
A U.S.-compliant policy document defining acceptable internet use guidelines and security protocols within an organization.
Company Aup
A U.S.-compliant policy document defining acceptable use of company IT systems and resources, including security requirements and usage guidelines.
Company Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of company technology resources and systems.
Aup It Services
A U.S.-governed policy document defining acceptable use rules and guidelines for IT systems and services.
Aup Internet
A U.S.-compliant legal document defining acceptable use rules and restrictions for internet services and online platforms.
Aup Information Security
A US-compliant policy document defining acceptable use of organizational IT resources and security requirements.
Aup In Cyber Security
A U.S.-governed policy document defining acceptable use of organizational IT resources and security requirements.
Aup Guidelines
A U.S.-compliant framework establishing rules for appropriate use of organizational technology resources and systems, incorporating federal and state regulations.
Aup Computer Security
A U.S.-compliant policy document defining acceptable use of organizational computer systems and networks, including security requirements and user responsibilities.
Aup Computer
A US-compliant policy document defining acceptable use rules and security requirements for organizational computer systems and networks.
Aup Agreement
A U.S.-compliant legal agreement defining acceptable use terms and conditions for digital services or networks.
Audit Test Plan
A U.S.-compliant document outlining the methodology and procedures for conducting organizational audits under federal and state auditing standards.
Audit Test Of Details
A U.S.-compliant document outlining specific procedures for detailed testing of financial statement elements in accordance with PCAOB standards.
Audit Program For Petty Cash
A U.S.-compliant systematic guide for examining and verifying petty cash management practices and internal controls within organizations.
Audit Program For Inventories
A structured guide for conducting inventory audits in compliance with U.S. auditing standards and regulations.
Audit Of Petty Cash
A U.S.-compliant document recording the examination and verification of an organization's petty cash fund, including cash count, receipt verification, and discrepancy documentation.
Audit Of Inventory And Warehousing Cycle
A U.S.-compliant contract establishing terms for auditing a company's inventory and warehousing processes, including regulatory compliance and reporting requirements.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.