Security Policies, Information Security Policies, Cyber
Security Policies, IT Security Policies.
Over 135 security policies, templates, plans, and forms.
Meet security and compliance requirements.
Altius IT Policy Collection
IT Security Policies - Immediate Download
|Comprehensive Policy Collection
with 135 policies, procedures, plans, and
forms to help you meet security and
|Created by Certified Auditors
||Certified by the
Information Systems Audit and Control
||Subscription updates available to keep your
collection up-to-date. Gold Collection members
receive free updates for 1 year.
Renew in future years for only $99* per year.
|Complete and Ready to Go
||Just insert your
organization's name (sample policy).
||Fully customizable Word
docs in an attractive format.
|Meets Security and Compliance
||We've done the work for
you: COBIT, GDPR, HIPAA, ISO, NIST, PCI, and others
network security, compliance, and risk
management (complete list of documents)
||Once you make your
purchase we will e-mail you a link to
download the collection.
||No software to download
or install (frequently asked questions).
||No need to hire a
security consultant. Save time and
||Over 25 years of
policies and IT security and compliance
audits. Featured on national
television and in over 40 publications (In
|Exceptional Satisfaction Rating
contact us via
e-mail for information on our reseller program.
Security Policy Templates
(135+ documents without updates)
(135+ documents with 1 yr. free updates)
- John Tompson, IT Director, "Your policy templates are very helpful. They were easy to customize to meet our specific needs."
- Paul Webber, Chief Risk Officer, "Your templates are complete and it was fast and easy to meet compliance requirements. We chose the Gold collection to keep our policies up-to-date."
- Joe Johnson, Network Administrator, "Management asked me to research IT policies. I found your collection and was glad I did. Not only did it include the policies to get us started, but it also included documents that will help us in the future."
- Rick Wilson, Lead Developer, "We develop cloud software applications. Clients frequently ask us about our security and your policy collection helps us meet their requirements."
(All documents listed below are included with your
Security Policy is the highest level policy document
that provides overall security guidance and direction.
This document refers to other policy
and plan documents listed below. Alternatively, the
Cybersecurity Framework Policy can be used as your
highest level policy document.
Network Security Policies & Plans
Acceptable Use Policy
Access Control Policy
Account Management Policy
Acquisition and Procurement Policy
Admin Special Access Policy
Asset Management Policy
Audit Trails Policy
Certification and Accreditation Policy
Change Management Policy
Data Integrity Policy
Data Marking Policy
Data Retention Policy
Database Security Policy
Domain Controller Policy
Domain Name System Policy
Facility Security Plan
Firewall Hardening Procedure
Guess Access Policy
Hardware and Software Maintenance
Identification and Authentication
Internet Connection Policy
Logical Access Controls Policy
Network Address Policy
Network Configuration Policy
Network Documentation Policy
Patch Management Policy
Personnel Security Policy
Physical Access Policy
Physical Security Policy
Problem Management Policy
Receipt & Acknowledgement
Remote Access Policy
Removable Media Policy
Router Security Policy
Securing Information Systems Policy
Securing Sensitive Information Policy
Security Monitoring Policy
Server Certificates Policy
Server Hardening Policy
Server Hardening Procedure
Software Licensing Policy
System Security Plan
System Update Policy
Terms and Definitions Policy
User Privilege Policy
Vendor Access Policy
Wireless Access Policy
Workstation Hardening Procedure
Workstation Security Policy
Compliance Policies and Plans
Clear Desk Policy
GDPR EU Privacy and Data Protection
HIPAA and HITECH Policy
Identity Theft Protection Policy
Security Awareness and Training Plan
Security Awareness and Training Policy
Security Controls Review Policy
System Controls SOC2 Policy
Third Party Service Providers Policy
Vulnerability and Penetration Testing
Bring Your Own Device & Technology
Context and Alignment Policy
Cybersecurity Framework Policy
Green Computing Policy
IT Governance Policy
IT Management Policy
Mass Communication Policy
Mergers and Acquisitions Policy
Mobile Device Policy
Portable Computing Policy
Production Input Output Controls Policy
Reporting Violations Policy
Security Policy (highest level
Social Networking Policy
Wearable Computing Device Policy
Risk Management Policies
Business Impact Analysis Policy
Data Classification Policy
Quality Assurance Policy
Risk Assessment Policy
Risk Management Policy
Security Self Assessment Policy
Incident Response Policies & Plans
Identity Theft Protection Policy
Incident Response Plan
Incident Response Policy
Intrusion Detection Policy
Business Continuity Policies & Plans
Business Continuity Communications
Business Continuity Disaster Recovery
Business Continuity Department Plan
Business Continuity Plan
Business Continuity Policy
Business Continuity Resumption Plan
Application Security Policies
Application Implementation Policy
Approved Application Policy
Secure Software Development Lifecycle
Software Development Policy
Web Site Policy
Asset Transfer Form
Audit Log Form
Backup Log Form
Business Impact Analysis Questionnaire
Change Management Log Form
Incident Response Form
I.S. Access Request Form
I.S. Log Form
Problem Management Form
Third Party Service Provider Log Form
Business Associate Agreement
FAQ, Payment Options,
Terms and Conditions
Frequently Asked Questions
The Silver Collection includes over 135 information systems security policies, plans,
and forms. The Altius IT Gold Collection includes everything in the Silver Collection plus you automatically
receive one year of free updates to existing policies as well as any new policies created by
our experts. In the future, Gold Collection members have the option of paying $99* per year
to keep their collection up-to-date.
Q: Why are there different collections?
A: Each organization has different needs. We
provide the best value by offering you a choice
of options. By purchasing the Altius IT Gold
Collection, you will automatically receive one
year of free updates to existing security policy
well as new policies created by our experts. In
future years you have the option of keeping your
collection up-to-date through our subscription
service. We will notify you when your
subscription is coming up for renewal and you
may cancel at any time.
Q: What if I need a policy that isn't
included in the above list?
A: Gold Collection clients can send us an e-mail
and we will evaluate your request. If we believe
other organizations can benefit from the policy
we will develop the policy and add it to our
policy collection. Collection members will
receive the new policy at no additional charge
during their subscription period.
Q: Are these IT Policy Templates, Security
Policy Templates, or a software program?
A: The Altius IT Policy Collection is a
collection of IT policies with an emphasis on
security and privacy. Each information security policy, plan, and
form has a consistent look and feel and is
provided as a separate Microsoft Word file. This
gives you the flexibility of only rolling out
the security policy documents, information policies, plans, and forms needed by your
Q: We need an information systems security
policy, information security policy manual, IT
security policy, cyber security policy,
technology security policies, and network
security policies. Can your collection help us?
A: Yes. We provide over 100 information security
policy templates specifically designed to
enhance your security posture by implementing
controls to reduce security and privacy risks.
Instead of assembling all policies in one large
document, the Altius IT Policy Collection
provides you with separate policy documents that
are easier to maintain and distribute to your
relevant staff. For example, web developers
should receive software development related
policies while network administrators should
receive network infrastructure related policies
(e.g. Firewall Policy, Server Hardening Policy,
etc.). Please see above for the actual names of
the IT policy templates included with our
Q: Does your collection help us meet security
A: Yes. The collection was developed by our
experts after many years of performing security
audits. The Altius IT Policy Collection was
developed to help organizations meet security
best practices, security policy standards, and
compliance requirements. If you are looking for
a security policies template, information policies, information security
policy, cyber security policy, IT policies and
procedures, or password security policies, our
collection can help you.
Q: How do I receive the Altius IT Policy
A: Once we receive your payment, we will e-mail
you instructions to download the collection of
security policies templates.
Q: How often is the Altius IT Policy Collection
A: It depends upon how frequently legislative
changes are enacted and/or changes are made to
security best practices. Typically we release
two or three sets of updates per year. The
advantage to you is that you don't need to
monitor legislation and standards for changes.
We do the work for you.
Q: How do I receive the updates?
A: If you purchased the Gold Collection no
action is needed on your part. We automatically
e-mail you the updates as soon as they are
available. In future years you have the option
to continue to renew the updates for $99* per
* Fee subject to change.
Credit/Debit Card - Altius IT accepts most major credit
and debit cards. To pay by payment card select
Silver or Gold collection.
Bank Wire - Organizations outside of the United States may want to contact us
for instructions to wire funds to our bank account.
Purchase Order - contact us for
instructions to acquire the Altius IT Policy
Collection using your organization's Purchase Order.
Note, using a Purchase Order may delay your access
to the Altius IT Policy Collection.
Terms and Conditions
By purchasing the Altius IT Policy Collection, you agree to these terms and conditions.
The policy templates should be modified to meet your specific needs, environment, level of risk tolerance, staff size, and other relevant factors.
You agree to provide us with your organization's name and contact information
so that you are properly licensed.
By purchasing and downloading the Altius IT Policy Collection, you are purchasing one non-transferable license for use of the policy
templates on one computer system. This license is granted solely to the one system and may not be sold, transferred, leased, or given
to any other person, entity, or organization.
You agree to ensure applicability within your specific organization,
compliance with regulations, and appropriateness. Altius IT recommends legal and human resources personnel review and approve your policies prior to
implementing the documents within your organization.
The Altius IT Policy Collection and policy documents are provided "as is" and Altius IT does not guarantee or warrant, either express or implied,
the policy templates. Altius IT makes no other warranties, whether written, oral or implied, including without limitation, warranty of fitness
for a particular purpose, merchantability, quality, performance, or compatibility with existing hardware or software.
Altius IT makes no warranty as to the suitability of its policy templates for any purpose and expressly disclaims any liability
with respect to the content of its policy templates, trademark rights, and disclosure of confidential information. This includes, but is not limited to,
errors, omissions, or other inaccuracies of the materials.
No refunds. Credit can be applied to our audit, assessment, and consulting services if you are unhappy with the Altius IT Policy Collection.
Altius IT reserves the right to change or modify these Terms and Conditions at any time. You may view the current Terms and Conditions by visiting
Policies. The Altius IT Policy Collection
contains documents known as security policies,
information security policy, cyber security
policy, security policies template, IT security
policy, information policies, IT policies,
network security policies, IT policy template,
security policy document, security policy
standards, and IT security policies.