Network Security Audit Risk Assessment Information Security Consulting Computer Forensics


Altius IT Policy Collection - complete set of cyber and network security policies

Over 100 Policies, Plans, and Forms (documents you will receive)

  • Complete - most complete and comprehensive cyber and network security policies available (sample policy)
  • Fully customizable - fully customizable IT security policies in Microsoft Word format
  • No software to download or install - no conflicts with your computer or applications
  • Security - quickly enhance your level of security with our complete collection
  • Compliance - quickly meet compliance: HIPAA, HITECH, GLB, SOX, Fed, PCI, NIST, ISO (compliance matrix)
  • Proven - trusted by government and Fortune 500 companies
  • Flat fee - one flat fee gets you the entire collection
  • Subscription plan - Altius IT Gold Collection keeps your collection up-to-date

The Silver Collection includes over 100 information systems security policies, plans, and forms.  The Altius IT Gold Collection includes everything in the Silver Collection plus you automatically receive one year of free updates to existing policies as well as any new policies created by our experts.  In the future, Gold Collection members have the option of paying $99* per year to keep their collection up-to-date.

Complete and comprehensive cyber and network security policy collection

Choose the Altius IT Policy Collection that best meets your specific needs

Silver Collection
(100+ documents without updates)

Gold Collection
(100+ documents with 1 yr free updates)

Immediate Download
We offer alternate payment options (PayPal, Bank Wire, PO) if you experience problems paying with a credit card.


What is a Policy?
A policy is a written document that specifies requirements and/or outcomes to control and manage risks.  Instead of implementing one large policy document, most organizations have an information security policy manual, a collection of policies with each policy addressing a specific area.  Procedures are then developed to identify the methodologies and steps needed to support the policies.


Policy Templates (included with your purchase and updated for 2016)

Our Altius IT Policy Collection helps you quickly enhance your level of security.

Receive 100+ policies, plans, and forms related to:

  • Network security
  • Incident response
  • Compliance
  • Security governance
  • Risk management
  • Business continuity
  • Application security

Network Security

Network Security Policies & Plans

  • Acceptable Use Policy
  • Account Management Policy
  • Acquisition and Procurement Policy
  • Admin Special Access Policy
  • Anti-Malware Policy
  • Asset Management Policy
  • Audit Trails Policy
  • Backup Plan
  • Backup Policy
  • Bluetooth Policy
  • Certification and Accreditation Policy
  • Change Management Policy
  • Data Integrity Policy
  • Data Marking Policy
  • Data Privacy Policy
  • Data Retention Policy
  • Disposal Policy
  • Domain Controller Policy
  • Domain Name System Policy
  • E-commerce Policy
  • Encryption Policy
  • Firewall Policy
  • Guess Access Policy
  • Hardware and Software Maintenance
  • Identification and Authentication
  • Internet Connection Policy
  • Logging Policy
  • Logical Access Controls Policy
  • Network Access Policy
  • Network Address Policy
  • Network Configuration Policy
  • Network Documentation Policy
  • Password Policy
  • Patch Management Policy
  • Personnel Security Policy
  • Physical Access Security Policy
  • Physical Security Policy
  • Procedure Template
  • Receipt & Acknowledgement
  • Remote Access Policy
  • Removable Media Policy
  • Router Security Policy
  • Securing Information Systems Policy
  • Securing Sensitive Information Policy
  • Security Monitoring Policy
  • Security Policy
  • Server Certificates Policy
  • Server Hardening Policy
  • Software Licensing Policy
  • System Security Plan
  • System Update Policy
  • Terms and Definitions Policy
  • User Privilege Policy
  • Vendor Access Policy
  • VPN Policy
  • Wireless Access Policy
  • Workstation Security Policy

Incident Response Security Policies and Plans
  • Identity Theft Protection Policy
  • Incident Response Plan
  • Incident Response Policy
  • Intrusion Detection Policy


Compliance Policies and Plans

  • Audit Policy
  • Compliance Policy
  • HIPAA and HITECH Policy
  • Identity Theft Protection Policy
  • Outsourcing Policy
  • PCI Policy
  • Privacy Policy
  • Security Awareness and Training Plan
  • Security Awareness and Training Policy
  • Security Controls Review Policy
  • Third Party Service Providers Policy

Security Governance Policies
  • Bring Your Own Device & Technology Policy
  • Cybersecurity Policy
  • Cybersecurity Framework Policy
  • Documentation Policy
  • E-mail Policy
  • Green Computing Policy
  • IT Governance Policy
  • IT Management Policy
  • Mass Communication Policy
  • Mergers and Acquisitions Policy
  • Mobile Device Policy
  • Portable Computing Policy
  • Production Input Output Controls Policy
  • Reporting Violations Policy
  • Smartphone Policy
  • Social Networking Policy
  • Staffing Policy
  • Wearable Computing Device Policy


Risk Management

Risk Management Policies

  • Business Impact Analysis Policy
  • Data Classification Policy
  • Quality Assurance Policy
  • Risk Assessment Policy
  • Risk Management Policy

Business Continuity Policies and Plans

  • Business Continuity Resumption Plan
  • Business Continuity Communications Plan
  • Business Continuity Disaster Recovery Plan
  • Business Continuity Department Plan
  • Business Continuity Plan
  • Business Continuity Policy

Application Security Policies
  • Application Implementation Policy
  • Approved Application Policy
  • Secure Software Development Lifecycle
  • Software Development Policy
  • Web Site Policy

  • Backup Log Form
  • Change Management Log Form
  • I.S. Access Request Form
  • I.S. Log Form
  • Third Party Service Provider Log Form

  • Business Associate Agreement
  • Non-disclosure Agreement

Back to top

Frequently Asked Questions

Q: Why are there different collections?
A: Each organization has different needs.  We provide the best value by offering you a choice of options.  By purchasing the Altius IT Gold Collection, you will automatically receive one year of free updates to existing policies as well as new policies created by our experts.  In future years you have the option of keeping your collection up-to-date through our subscription service.  We will notify you when your subscription is coming up for renewal and you may cancel at any time.

Q: What if I need a policy that isn't included in the above list?
A: Gold Collection clients can send us an e-mail and we will evaluate your request.  If we believe other organizations can benefit from the policy we will develop the policy and add it to our policy collection.  Collection members will receive the new policy at no additional charge during their subscription period.

Q: Are these IT Policy Templates, Security Policy Templates, or a software program?
A: The Altius IT Policy Collection is a collection of IT policies with an emphasis on security and privacy.  Each policy, plan, and form has a consistent look and feel and is provided as a separate Microsoft Word file.  This gives you the flexibility of only rolling out the policies, plans, and forms needed by your organization.

Q: We need an information systems security policy, information security policy manual, IT security policy, cyber security policy, technology security policies, and network security policies.  Can your collection help us?
A: Yes.  We provide over 100 information systems IT policy templates specifically designed to enhance your security posture by implementing controls to reduce security and privacy risks.  Instead of assembling all policies in one large document, the Altius IT Policy Collection provides you with separate policy documents that are easier to maintain and distribute to your relevant staff.  For example, web developers should receive software development related policies while network administrators should receive network infrastructure related policies (e.g. Firewall Policy, Server Hardening Policy, etc.).  Please see above for the actual names of the IT policy templates included with our collection.

Q: Does your collection help us meet security policy standards?
A: Yes.  The collection was developed by our experts after many years of performing security audits.  The Altius IT Policy Collection was developed to help organizations meet security best practices, security policy standards, and compliance requirements.  If you are looking for information policies, information security policy, cyber security policy, IT policies and procedures, or password security policies, our collection can help you.

Q: How do I receive the Altius IT Policy Collection?
A: Once we receive your payment, we will e-mail you instructions to download the collection.

Q: How often is the Altius IT Policy Collection updated?
A: It depends upon how frequently legislative changes are enacted and/or changes are made to security best practices.  Typically we release two or three sets of updates per year.  The advantage to you is that you don't need to monitor legislation and standards for changes.  We do the work for you.

Q: How do I receive the updates?
A: If you purchased the Gold Collection no action is needed on your part.  We automatically e-mail you the updates as soon as they are available.  In future years you have the option to continue to renew the updates for $99* per year.

* Fee subject to change.

Back to top

Alternate Payment Options

Bank Wire - Organizations outside of the United States may want to contact us for instructions to wire funds to our bank account.

Purchase Order - contact us for instructions to acquire the Altius IT Policy Collection using your organization's Purchase Order.  Note, using a Purchase Order may delay your access to the Altius IT Policy Collection.
PayPal - Altius IT accepts payment by PayPal.
PayPal Payment Options

 Back to top

Terms and Conditions
The Altius IT Policy Collection includes IT policy and privacy templates that can be customized to your specific needs. By purchasing the Altius IT Policy Collection, you agreed to these terms and conditions.

The policy templates should be modified to meet your specific needs, environment, level of risk tolerance, staff size, and other relevant factors.

By purchasing and downloading the Altius IT Policy Collection, you agree to ensure applicability within your specific organization, compliance with regulations, and appropriateness. Altius IT recommends legal and human resources personnel review and approve your policies prior to implementing within your organization.

By purchasing and downloading the Altius IT Policy Collection, you are purchasing one non-transferable license for use of the policy templates on one computer system. This license is granted solely to the one system and may not be sold, transferred, leased, or given to any other entity or organization.

The Altius IT Policy Collection and policy documents are provided "as is" and Altius IT does not guarantee or warrant, either express or implied, the policy templates. Altius IT makes no other warranties, whether written, oral or implied, including without limitation, warranty of fitness for a particular purpose, merchantability, quality, performance, or compatibility with existing hardware or software. Altius IT makes no warranty as to the suitability of its policy templates for any purpose and expressly disclaims any liability with respect to the content of its policy templates, trademark rights, and disclosure of confidential information. This includes, but is not limited to, errors, omissions, or other inaccuracies of the materials.

No refunds. Credit can be applied to our audit, assessment, and consulting services if you are unhappy with the Altius IT Policy Collection.

Back to top

Links: Assessment Overview | Network Audit | Security Audit | Compliance Audit |
| Penetration Assessment | Website Application Security Audit | Website Compliance |
| Security Policies | Security Consulting |

Labels: policy and procedure, security policies, policies and procedures, IT security policies, IT security policy, information policies, security policies procedures, security policies template, security policies and procedures, cyber security policy, computer security policy, network security policies, password security policies, password security policy, pre-written policies, network security policy template., information security policy manual, information systems security policy, IT policies and procedures, online security policy, Internet security policy, bank security policy, security policy documents, technology security policies, IT policy template, security policy template