Altius IT logo

Security Policies, Information Security Policies, Cyber Security Policies, IT Security Policies.

Over 100 security policies, templates, plans, and forms. Meet security and compliance requirements.


Altius IT Policy Collection

Security and privacy policies

IT Security Policies - Immediate Download

  • Complete - Over 100 policies, plans, and forms to help you meet security and compliance requirements
  • Customizable - provided in Word format, customizable to your specific environment (sample policy)
  • Compliance - quickly meet compliance requirements (compliance matrix)
  • No conflicts - no software to download or install (frequently asked questions)
Altius IT Policy Collection - Policy templates Security Policy Templates (payment options)

Silver Collection
(100+ documents without updates)

Silver Collection


Gold Collection
(100+ documents with 1 yr. free updates)

Gold Collection


Policy Templates
(All documents are included with your purchase)

Network security policies

Network Security
Network Security Policies & Plans
Acceptable Use Policy
Account Management Policy
Acquisition and Procurement Policy
Admin Special Access Policy
Anti-Malware Policy
Asset Management Policy
Audit Trails Policy
Backup Plan
Backup Policy
Bluetooth Policy
Certification and Accreditation Policy
Change Management Policy
Data Integrity Policy
Data Marking Policy
Data Privacy Policy
Data Retention Policy
Disposal Policy
Domain Controller Policy
Domain Name System Policy
E-commerce Policy
Encryption Policy
Facility Security Plan
Firewall Policy
Guess Access Policy
Hardware and Software Maintenance
Identification and Authentication
Internet Connection Policy
Logging Policy
Logical Access Controls Policy
Network Access Policy
Network Address Policy
Network Configuration Policy
Network Documentation Policy
Password Policy
Patch Management Policy
Personnel Security Policy
Physical Access Security Policy
Physical Security Policy
Procedure Template
Receipt & Acknowledgement
Remote Access Policy
Removable Media Policy
Router Security Policy
Securing Information Systems Policy
Securing Sensitive Information Policy
Security Monitoring Policy
Security Policy (IT Security Policy)
Server Certificates Policy
Server Hardening Policy
Software Licensing Policy
System Security Plan
System Update Policy
Terms and Definitions Policy
User Privilege Policy
Vendor Access Policy
VPN Policy
Wireless Access Policy
Workstation Security Policy

Incident Response
Identity Theft Protection Policy
Incident Response Plan
Incident Response Policy
Intrusion Detection Policy

Compliance policies

Compliance Policies and Plans
Audit Policy
Compliance Policy
Identity Theft Protection Policy
Outsourcing Policy
PCI Policy
Privacy Policy
Security Awareness and Training Plan
Security Awareness and Training Policy
Security Controls Review Policy
Third Party Service Providers Policy

Security Governance
Bring Your Own Device & Technology
Context and Alignment Policy
Cybersecurity Policy
Cybersecurity Framework Policy
Documentation Policy
E-mail Policy
Green Computing Policy
IT Governance Policy
IT Management Policy
Mass Communication Policy
Mergers and Acquisitions Policy
Mobile Device Policy
Portable Computing Policy
Production Input Output Controls Policy
Reporting Violations Policy
Smartphone Policy
Social Networking Policy
Staffing Policy
Wearable Computing Device Policy

Risk management policies

Risk Management
Risk Management Policies
Business Impact Analysis Policy
Data Classification Policy
Quality Assurance Policy
Risk Assessment Policy
Risk Management Policy

Business Continuity Policies/Plans Business Continuity Resumption Plan
Business Continuity Communications
Business Continuity Disaster Recovery
Business Continuity Department Plan
Business Continuity Plan
Business Continuity Policy

Application Security Policies
Application Implementation Policy
Approved Application Policy
Secure Software Development Lifecycle
Software Development Policy
Web Site Policy

Backup Log Form
Change Management Log Form
I.S. Access Request Form
I.S. Log Form
Third Party Service Provider Log Form

Business Associate Agreement
Non-disclosure Agreement

FAQ, Payment Options, Terms and Conditions

Policy FAQ

Frequently Asked Questions
The Silver Collection includes over 100 information systems security policies, plans, and forms. The Altius IT Gold Collection includes everything in the Silver Collection plus you automatically receive one year of free updates to existing policies as well as any new policies created by our experts.  In the future, Gold Collection members have the option of paying $99* per year to keep their collection up-to-date.

Q: Why are there different collections?
A: Each organization has different needs. We provide the best value by offering you a choice of options. By purchasing the Altius IT Gold Collection, you will automatically receive one year of free updates to existing security policy documents as well as new policies created by our experts. In future years you have the option of keeping your collection up-to-date through our subscription service. We will notify you when your subscription is coming up for renewal and you may cancel at any time.

Q: What if I need a policy that isn't included in the above list?
A: Gold Collection clients can send us an e-mail and we will evaluate your request. If we believe other organizations can benefit from the policy we will develop the policy and add it to our policy collection. Collection members will receive the new policy at no additional charge during their subscription period.

Q: Are these IT Policy Templates, Security Policy Templates, or a software program?
A: The Altius IT Policy Collection is a collection of IT policies with an emphasis on security and privacy. Each information security policy, plan, and form has a consistent look and feel and is provided as a separate Microsoft Word file. This gives you the flexibility of only rolling out the security policy documents, information policies, plans, and forms needed by your organization.

Q: We need an information systems security policy, information security policy manual, IT security policy, cyber security policy, technology security policies, and network security policies. Can your collection help us?
A: Yes. We provide over 100 information security policy templates specifically designed to enhance your security posture by implementing controls to reduce security and privacy risks. Instead of assembling all policies in one large document, the Altius IT Policy Collection provides you with separate policy documents that are easier to maintain and distribute to your relevant staff. For example, web developers should receive software development related policies while network administrators should receive network infrastructure related policies (e.g. Firewall Policy, Server Hardening Policy, etc.). Please see above for the actual names of the IT policy templates included with our collection.

Q: Does your collection help us meet security policy standards?
A: Yes. The collection was developed by our experts after many years of performing security audits. The Altius IT Policy Collection was developed to help organizations meet security best practices, security policy standards, and compliance requirements. If you are looking for a security policies template, information policies, information security policy, cyber security policy, IT policies and procedures, or password security policies, our collection can help you.

Q: How do I receive the Altius IT Policy Collection?
A: Once we receive your payment, we will e-mail you instructions to download the collection of security policies templates.

Q: How often is the Altius IT Policy Collection updated?
A: It depends upon how frequently legislative changes are enacted and/or changes are made to security best practices. Typically we release two or three sets of updates per year. The advantage to you is that you don't need to monitor legislation and standards for changes. We do the work for you.

Q: How do I receive the updates?
A: If you purchased the Gold Collection no action is needed on your part. We automatically e-mail you the updates as soon as they are available. In future years you have the option to continue to renew the updates for $99* per year.

* Fee subject to change.


Policy payment options

Payment Options

Credit Card - Altius IT accepts most major credit cards. To pay by credit card select either our Silver or Gold collection.

Bank Wire - Organizations outside of the United States may want to contact us for instructions to wire funds to our bank account.

Purchase Order - contact us for instructions to acquire the Altius IT Policy Collection using your organization's Purchase Order.  Note, using a Purchase Order may delay your access to the Altius IT Policy Collection.
PayPal - Altius IT accepts payment by PayPal.
PayPal Payment Options

Policy terms and conditions

Terms and Conditions
The Altius IT Policy Collection includes IT security and privacy policy templates that can be customized to your specific needs. By purchasing the Altius IT Policy Collection, you agree to these terms and conditions.

The policy templates should be modified to meet your specific needs, environment, level of risk tolerance, staff size, and other relevant factors.

By purchasing and downloading the Altius IT Policy Collection, you agree to ensure applicability within your specific organization, compliance with regulations, and appropriateness. Altius IT recommends legal and human resources personnel review and approve your policies prior to implementing within your organization.

By purchasing and downloading the Altius IT Policy Collection, you are purchasing one non-transferable license for use of the policy templates on one computer system. This license is granted solely to the one system and may not be sold, transferred, leased, or given to any other entity or organization.

The Altius IT Policy Collection and policy documents are provided "as is" and Altius IT does not guarantee or warrant, either express or implied, the policy templates. Altius IT makes no other warranties, whether written, oral or implied, including without limitation, warranty of fitness for a particular purpose, merchantability, quality, performance, or compatibility with existing hardware or software. Altius IT makes no warranty as to the suitability of its policy templates for any purpose and expressly disclaims any liability with respect to the content of its policy templates, trademark rights, and disclosure of confidential information. This includes, but is not limited to, errors, omissions, or other inaccuracies of the materials.

No refunds. Credit can be applied to our audit, assessment, and consulting services if you are unhappy with the Altius IT Policy Collection.

Policies.  The Altius IT Policy Collection contains documents known as security policies, information security policy, cyber security policy, security policies template, IT security policy, information policies, IT policies, network security policies, IT policy template, security policy document, security policy standards, and IT security policies.