Network Security Audit Risk Assessment Information Security Consulting Computer Forensics


Altius IT Policy Collection - complete set of security and privacy policies

Over 100 Policies, Plans, and Forms (documents you will receive)

  • Complete - most complete and comprehensive security and privacy policies available (sample policy)
  • Fully customizable - fully customizable policies in Microsoft Word format
  • Security - quickly enhance your level of security with our complete collection
  • Compliance - quickly meet compliance: HIPAA, HITECH, GLB, SOX, Fed, PCI, NIST, ISO (compliance matrix)
  • Proven - trusted by government and Fortune 500 companies
  • Flat fee - one flat fee gets you the entire collection
  • Subscription plan - Altius IT Gold Collection keeps your collection up-to-date

The Silver Collection includes over 100 policies, plans, and forms.  The Altius IT Gold Collection includes everything in the Silver Collection plus you automatically receive one year of free updates to existing policies as well as any new policies created by our experts.  In the future, Gold Collection members have the option of paying $99* per year to keep their collection up-to-date.

Complete and comprehensive security and privacy collection

Choose the Altius IT Policy Collection that best meets your specific needs

Silver Collection
(100+ documents without updates)

Gold Collection
(100+ documents with 1 yr free updates)

Immediate Download
We offer alternate payment options (PayPal, Bank Wire, PO) If you experience problems paying with a credit card.


What is a Policy?
Policies help organizations implement controls to manage their risks.  A policy is a written document that specifies requirements and/or outcomes.  Instead of having one large document, organizations tend to have many policies, each addressing a specific area.  Procedures are then developed to identify the methodologies and steps needed to support the policies.


Policy Templates (included with your purchase and updated for 2014)

Our Altius IT Policy Collection helps you quickly enhance your level of security.

Receive 100+ policies, plans, and forms related to:

  • Network security
  • Incident response
  • Compliance
  • Security governance
  • Risk management
  • Business continuity
  • Application security

Network Security

Network Security Policies & Plans

  • Acceptable Use Policy
  • Account Management Policy
  • Acquisition and Procurement Policy
  • Admin Special Access Policy
  • Anti-Malware Policy
  • Asset Management Policy
  • Audit Trails Policy
  • Backup Plan
  • Backup Policy
  • Bluetooth Policy
  • Certification and Accreditation Policy
  • Change Management Policy
  • Data Integrity Policy
  • Data Marking Policy
  • Data Privacy Policy
  • Data Retention Policy
  • Disposal Policy
  • Domain Controller Policy
  • Domain Name System Policy
  • E-commerce Policy
  • Encryption Policy
  • Firewall Policy
  • Guess Access Policy
  • Hardware and Software Maintenance
  • Identification and Authentication
  • Internet Connection Policy
  • Logging Policy
  • Logical Access Controls Policy
  • Network Access Policy
  • Network Address Policy
  • Network Configuration Policy
  • Network Documentation Policy
  • Password Policy
  • Patch Management Policy
  • Personnel Security Policy
  • Physical Access Security Policy
  • Physical Security Policy
  • Procedure Template
  • Receipt & Acknowledgement
  • Remote Access Policy
  • Removable Media Policy
  • Router Security Policy
  • Securing Information Systems Policy
  • Securing Sensitive Information Policy
  • Security Monitoring Policy
  • Security Policy
  • Server Certificates Policy
  • Server Hardening Policy
  • Software Licensing Policy
  • System Security Plan
  • System Update Policy
  • Terms and Definitions Policy
  • User Privilege Policy
  • Vendor Access Policy
  • VPN Policy
  • Wireless Access Policy
  • Workstation Security Policy

Incident Response Security Policies and Plans
  • Identity Theft Protection Policy
  • Incident Response Plan
  • Incident Response Policy
  • Intrusion Detection Policy


Compliance Policies and Plans

  • Audit Policy
  • Compliance Policy
  • HIPAA and HITECH Policy
  • Identity Theft Protection Policy
  • Outsourcing Policy
  • PCI Policy
  • Privacy Policy
  • Security Awareness and Training Plan
  • Security Awareness and Training Policy
  • Security Controls Review Policy
  • Third Party Service Providers Policy

Security Governance Policies
  • Bring Your Own Device & Technology Policy
  • Documentation Policy
  • E-mail Policy
  • Green Computing Policy
  • IT Governance Policy
  • IT Management Policy
  • Mass Communication Policy
  • Mergers and Acquisitions Policy
  • Mobile Device Policy
  • Portable Computing Policy
  • Production Input Output Controls Policy
  • Reporting Violations Policy
  • Smartphone Policy
  • Social Networking Policy
  • Staffing Policy
  • Wearable Computing Device Policy


Risk Management

Risk Management Policies

  • Business Impact Analysis Policy
  • Data Classification Policy
  • Quality Assurance Policy
  • Risk Assessment Policy
  • Risk Management Policy

Business Continuity Policies and Plans

  • Business Continuity Resumption Plan
  • Business Continuity Communications Plan
  • Business Continuity Disaster Recovery Plan
  • Business Continuity Department Plan
  • Business Continuity Plan
  • Business Continuity Policy

Application Security Policies
  • Application Implementation Policy
  • Approved Application Policy
  • Secure Software Development Lifecycle
  • Software Development Policy
  • Web Site Policy

  • Backup Log Form
  • Change Management Log Form
  • I.S. Access Request Form
  • I.S. Log Form
  • Third Party Service Provider Log Form


Back to top

Frequently Asked Questions

Q: Why are there different collections?
A: Each organization has different needs.  We provide the best value by offering you a choice of options.  By purchasing the Altius IT Gold Collection, you will automatically receive one year of free updates to existing policies as well as new policies created by our experts.  In future years you have the option of keeping your collection up-to-date.

Q: What if I need a policy that isn't included in the above list?
A: Gold Collection clients can send us an e-mail and we will evaluate your request.  If we believe other organizations can benefit from the policy we will develop the policy and add it to our policy collection.  Collection members will receive the new policy at no additional charge during their subscription period.

Q: How do I receive the Altius IT Policy Collection?
A: Once we receive your payment, we will e-mail you instructions to download the collection.

Q: How often is the Altius IT Policy Collection updated?
A: It depends upon how frequently legislative changes are enacted and/or changes are made to security best practices.  Typically we release two sets of updates per year.  The advantage to you is that you don't need to monitor legislation and standards for changes.  We do the work for you.

Q: How do I receive the updates?
A: If you purchased the Gold Collection no action is needed on your part.  We automatically e-mail you the updates as soon as they are available.  In future years you have the option to continue to renew the updates for $99* per year.

* Fee subject to change.

Back to top

Alternate Payment Options

Bank Wire - Organizations outside of the United States may want to contact us for instructions to wire funds to our bank account.

Purchase Order - contact us for instructions to acquire the Altius IT Policy Collection using your organization's Purchase Order.  Note, using a Purchase Order may delay your access to the Altius IT Policy Collection.
PayPal - Altius IT accepts payment by PayPal.
PayPal Payment Options

 Back to top

Terms and Conditions
The Altius IT Policy Collection includes IT policy and privacy templates that can be customized to your specific needs. By purchasing the Altius IT Policy Collection, you agreed to these terms and conditions.

The policy templates should be modified to meet your specific needs, environment, level of risk tolerance, staff size, and other relevant factors.

By purchasing and downloading the Altius IT Policy Collection, you agree to ensure applicability within your specific organization, compliance with regulations, and appropriateness. Altius IT recommends legal and human resources personnel review and approve your policies prior to implementing within your organization.

By purchasing and downloading the Altius IT Policy Collection, you are purchasing one non-transferable license for use of the policy templates on one computer system. This license is granted solely to the one system and may not be sold, transferred, leased, or given to any other entity or organization.

The Altius IT Policy Collection and policy documents are provided "as is" and Altius IT does not guarantee or warrant, either express or implied, the policy templates. Altius IT makes no other warranties, whether written, oral or implied, including without limitation, warranty of fitness for a particular purpose, merchantability, quality, performance, or compatibility with existing hardware or software. Altius IT makes no warranty as to the suitability of its policy templates for any purpose and expressly disclaims any liability with respect to the content of its policy templates, trademark rights, and disclosure of confidential information. This includes, but is not limited to, errors, omissions, or other inaccuracies of the materials.

No refunds. Credit can be applied to our audit, assessment, and consulting services if you are unhappy with the Altius IT Policy Collection.

Back to top

Links: Assessment Overview | Network Audit | Security Audit | Compliance Audit |
| Penetration Assessment | Website Application Security Audit | Website Compliance |
| Security Policies | Security Consulting |

Labels: policy and procedure, security policies, policies and procedures, IT security policies, information policies, security policies procedures, security policies template, security policies and procedures, cyber security policy, computer security policy, network security policies, password security policies, pre-written policies, network security policy template.