IT Policy & Governance Library for UK Business
Enterprise-grade security requires clear governance. Download and adopt these accredited policy templates to protect your data, staff, and compliance posture.
Standard Operational Standards (SOPs)
We have curated this library of essential IT policies to help UK organizations meet GDPR requirements, ISO 27001 controls, and Cyber Essentials standards.
Instructions: Please enter your business email to unlock the library. Download the Word documents below, replace "[Company Name]" with your business name, and distribute them to your team.
Acceptable Use of AI
Strict boundaries for using tools like ChatGPT and Copilot. Protects against IP leakage and ensures data privacy.
Download .DOCXBring Your Own Device (BYOD)
Governs personal devices, passcodes, and the "Remote Wipe" clause for lost phones/laptops.
Download .DOCXPassword & Access Control
Mandates 12+ character complexity, MFA usage, and prohibits sharing credentials.
Download .DOCXRemote Working Security
Covers public Wi-Fi risks, privacy screens, and physical security for hybrid workers.
Download .DOCXData Retention & Disposal
Specifies retention periods and secure shredding protocols to comply with UK GDPR.
Download .DOCXEmergency Incident Checklist
A "Break Glass" guide for immediate action during a cyber attack or data breach.
Download .DOCXSocial Media & Internet Policy
Outlines acceptable browsing, prohibited content, and rules against oversharing online.
Download .DOCXClean Desk & Clear Screen
Physical security basics. Mandates locking screens and securing confidential papers.
Download .DOCXGuest Wi-Fi Acceptable Use
Terms of service for visitors. Prohibits illegal activity and limits liability when offering free Wi-Fi.
Download .DOCXNeed help implementing these policies?
We can configure your Microsoft 365 environment to enforce these rules automatically.
Speak to a Consultant