{"id":9,"date":"2022-09-10T08:42:14","date_gmt":"2022-09-10T08:42:14","guid":{"rendered":"https:\/\/oldstore.cyberadviser.net\/?post_type=download&#038;p=9"},"modified":"2022-09-11T20:51:14","modified_gmt":"2022-09-11T20:51:14","slug":"information-security-policy-template","status":"publish","type":"download","link":"https:\/\/oldstore.cyberadviser.net\/index.php\/downloads\/information-security-policy-template\/","title":{"rendered":"Information Security Policy Template"},"content":{"rendered":"<p>Download the Information Security Policy template that is the high-level statement allowing you to start your Information Security Management System (ISMS) and helping you to declare security targets of your organization.<\/p>\n<p>About the document:<\/p>\n<p>The Information Security Policy sets the security management principles, highlights the management commitment, outlines the framework of supporting policies, declares the information security objectives and defines the roles and responsibilities.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-26\" src=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/Information_Security_Policy_Cover_Page2-232x300.png\" alt=\"\" width=\"146\" height=\"189\" srcset=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/Information_Security_Policy_Cover_Page2-232x300.png 232w, https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/Information_Security_Policy_Cover_Page2.png 659w\" sizes=\"(max-width: 146px) 100vw, 146px\" \/><\/p>\n<ul>\n<li>In Microsoft Word format (.docx)<\/li>\n<li>9 pages<\/li>\n<li>Aligned with ISO\/IEC 27001 standard requirements<\/li>\n<li>Easily customizable for your organization needs<\/li>\n<li>Created based on the adjustable corporate template<\/li>\n<\/ul>\n<p>Download:<\/p>\n<p><a href=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/ISMS-POL-01_Information_Security_Policy_Template.docx\">ISMS-POL-01_Information_Security_Policy_Template<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Download the Information Security Policy template that is the high-level statement allowing you to start your Information Security Management System (ISMS) and helping you to declare security targets of your organization. About the document: The Information Security Policy sets the security management principles, highlights the management commitment, outlines the framework of supporting policies, declares the &hellip; <\/p>\n","protected":false},"author":1,"featured_media":85,"template":"","edd-categories":[],"edd-tags":[3],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads\/9"}],"collection":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads"}],"about":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/types\/download"}],"author":[{"embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":11,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads\/9\/revisions"}],"predecessor-version":[{"id":31,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads\/9\/revisions\/31"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/media\/85"}],"wp:attachment":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/media?parent=9"}],"wp:term":[{"taxonomy":"download_category","embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-categories?post=9"},{"taxonomy":"download_tag","embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-tags?post=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}