{"id":152,"date":"2022-09-19T22:59:20","date_gmt":"2022-09-19T22:59:20","guid":{"rendered":"https:\/\/oldstore.cyberadviser.net\/?page_id=152"},"modified":"2022-09-20T18:59:11","modified_gmt":"2022-09-20T18:59:11","slug":"documents","status":"publish","type":"page","link":"https:\/\/oldstore.cyberadviser.net\/index.php\/documents\/","title":{"rendered":"Documents"},"content":{"rendered":"<div id=\"sp-page\" class=\"spBgcover sp-content-1\" style=\"background-color: rgb(255, 255, 255); font-family: 'Helvetica Neue', Arial, sans-serif; font-weight: 400;\">\n<section id=\"sp-ks8a8s\" data-mobile-visibility=\"#sp-ks8a8s|false\" data-desktop-visibility=\"#sp-ks8a8s|false\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%; padding: 10px;\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-vw3kvy\" data-mobile-visibility=\"#sp-vw3kvy|false\" data-desktop-visibility=\"#sp-vw3kvy|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"padding: 0px;\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-xqovw2\" data-mobile-visibility=\"#sp-xqovw2|false\" data-desktop-visibility=\"#sp-xqovw2|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(17% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<figure id=\"sp-p3gfdc\" data-mobile-css=\"#sp-p3gfdc|text-align:center;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px; text-align: center;\">\n<div><span><a href=\"..\" target=\"\" rel=\"noopener\" class=\"sp-inline-block\"><img loading=\"lazy\" src=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/cropped-Fingerprint.png\" alt=\"\" width=\"512\" height=\"512\" srcset=\" https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/cropped-Fingerprint-150x150.png 150w, https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/cropped-Fingerprint-300x300.png 300w, https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/cropped-Fingerprint.png 512w\" style=\"width: 512px;\"><\/a><\/span><\/div>\n<\/figure>\n<\/div>\n<div id=\"sp-mmyd6s\" data-mobile-visibility=\"#sp-mmyd6s|false\" data-desktop-visibility=\"#sp-mmyd6s|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(53% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<h6 id=\"sp-g3zsh7\" data-mobile-css=\".sp-headline-block-g3zsh7, #sp-g3zsh7, #g3zsh7|text-align:center;\" data-mobile-visibility=\".sp-headline-block-g3zsh7|false\" data-desktop-visibility=\".sp-headline-block-g3zsh7|false\" class=\"sp-css-target sp-el-block sp-headline-block-g3zsh7 sp-type-header\" style=\"font-size: 38px; font-weight: bold; font-family: Georgia, serif; line-height: 3.4; letter-spacing: 12px; color: rgb(11, 11, 37); text-align: left; margin: 0px;\">CYBERADVISER<\/h6>\n<\/div>\n<div id=\"sp-kppuln\" data-mobile-visibility=\"#sp-kppuln|false\" data-desktop-visibility=\"#sp-kppuln|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(30% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-button-parent-x5cnty\" data-mobile-css=\"#sp-button-parent-x5cnty|text-align:center;\" class=\"sp-button-wrapper sp-el-block\" style=\"margin: 0px; text-align: center;\"><a href=\"\" id=\"sp-x5cnty\" data-mobile-css=\"\" data-mobile-visibility=\".sp-button-x5cnty|false\" data-desktop-visibility=\".sp-button-x5cnty|false\" target=\"\" rel=\"noopener\" class=\"sp-button sp-css-target sp-text-center sp-inline-block sp-leading-none sp-button-x5cnty\" style=\"font-size: 22px; background: rgb(11, 11, 37); color: rgb(255, 255, 255); width: auto; padding: 16px 20px; border-radius: 4px;\"><span>Schedule a call<\/span><\/a><\/div>\n<\/div>\n<\/div>\n<div id=\"sp-j74v17\" data-mobile-visibility=\"#sp-j74v17|false\" data-desktop-visibility=\"#sp-j74v17|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-vwp0d9\" data-mobile-visibility=\"#sp-vwp0d9|false\" data-desktop-visibility=\"#sp-vwp0d9|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-nr2cwf\" data-mobile-visibility=\".sp-divider-block-nr2cwf|false\" data-desktop-visibility=\".sp-divider-block-nr2cwf|false\" data-mobile-css=\"#sp-nr2cwf .sp-divider-text-block .sp-divider-text, #sp-nr2cwf|justify-content:center;padding:10px 0px 10px 0px ;\" class=\"sp-divider-wrapper sp-flex sp-el-block sp-divider-block-nr2cwf\" style=\"margin: 0px; justify-content: center; padding: 10px 0px;\">\n<style type=\"text\/css\">\n    #sp-nr2cwf .sp-divider-separator::after , #sp-nr2cwf .sp-divider-separator::before  {content:\"\"}\n    #sp-nr2cwf .sp-divider .sp-divider-separator::after , #sp-nr2cwf .sp-divider .sp-divider-separator::before {display:block;border-top:1px solid #0B0B25}\n    #sp-nr2cwf .sp-divider .sp-divider-text-block .sp-divider-text \n    {color:#0B0B25}\n    #sp-nr2cwf .sp-divider .sp-divider-text-block.sp-divider-icon-block \n    {color:#0B0B25}\n  <\/style>\n<div class=\"sp-divider sp-flex\" style=\"width: 100%; border-top: 1px solid rgb(11, 11, 37);\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-s7qkyf\" data-mobile-visibility=\"#sp-s7qkyf|false\" data-desktop-visibility=\"#sp-s7qkyf|false\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%;\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-dns5za\" data-mobile-visibility=\"#sp-dns5za|false\" data-desktop-visibility=\"#sp-dns5za|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-wjkcou\" data-mobile-visibility=\"#sp-wjkcou|false\" data-desktop-visibility=\"#sp-wjkcou|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-xnnxjw\" data-mobile-css=\".sp-text-wrapper-xnnxjw, #sp-xnnxjw, #xnnxjw|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-xnnxjw|false\" data-desktop-visibility=\".sp-text-wrapper-xnnxjw|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-xnnxjw\" style=\"margin: 0px; text-align: left;\">\n<p>Based on collection of comprehensive information security documents, the Security and Privacy Management Framework (SPMF) helps establishing a compliance with many information security and privacy management systems. Using a single unified set of policies, Cyberadviser&#8217;s SPMF compliance is aimed at addressing ISO 27001, ISF SOGP, CSA standards. Any organization may create information security policies that are both practical and rapidly enforceable by using SPMF policy templates.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-a6ek3o\" data-mobile-visibility=\"#sp-a6ek3o|false\" data-desktop-visibility=\"#sp-a6ek3o|false\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%;\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-bcrm7y\" data-mobile-visibility=\"#sp-bcrm7y|false\" data-desktop-visibility=\"#sp-bcrm7y|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-g6nyn7\" data-mobile-visibility=\"#sp-g6nyn7|false\" data-desktop-visibility=\"#sp-g6nyn7|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<figure id=\"sp-b35ywh\" data-mobile-css=\"#sp-b35ywh|text-align:center;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px; text-align: center;\">\n<div><span><img loading=\"lazy\" src=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/documentation_pyramid_4_layers.png\" alt=\"\" width=\"791\" height=\"482\" data-mobile-visibility=\".sp-image-block-b35ywh|false\" data-desktop-visibility=\".sp-image-block-b35ywh|false\" srcset=\" https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/documentation_pyramid_4_layers-150x150.png 150w, https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/documentation_pyramid_4_layers-300x183.png 300w, https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/2022\/09\/documentation_pyramid_4_layers.png 791w\" class=\"sp-image-block-b35ywh\" style=\"width: 791px;\"><\/span><\/div>\n<\/figure>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-b0khjd\" data-mobile-visibility=\"#sp-b0khjd|false\" data-desktop-visibility=\"#sp-b0khjd|false\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%;\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-qc93ly\" data-mobile-visibility=\"#sp-qc93ly|false\" data-desktop-visibility=\"#sp-qc93ly|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-y03tpl\" data-mobile-visibility=\"#sp-y03tpl|false\" data-desktop-visibility=\"#sp-y03tpl|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<h1 id=\"sp-m4wzno\" data-mobile-css=\".sp-headline-block-m4wzno, #sp-m4wzno, #m4wzno|text-align:center;\" data-mobile-visibility=\".sp-headline-block-m4wzno|false\" data-desktop-visibility=\".sp-headline-block-m4wzno|false\" class=\"sp-css-target sp-el-block sp-headline-block-m4wzno sp-type-header\" style=\"font-size: 35px; text-align: center; margin: 0px;\">Policies in the Security and Privacy Management Framework<\/h1>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-si29zc\" data-mobile-visibility=\"#sp-si29zc|false\" data-desktop-visibility=\"#sp-si29zc|false\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%;\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-h2a03f\" data-mobile-visibility=\"#sp-h2a03f|false\" data-desktop-visibility=\"#sp-h2a03f|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-ttyt9v\" data-mobile-visibility=\"#sp-ttyt9v|false\" data-desktop-visibility=\"#sp-ttyt9v|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-sv3duf\" data-mobile-css=\".sp-text-wrapper-sv3duf, #sp-sv3duf, #sv3duf|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-sv3duf|false\" data-desktop-visibility=\".sp-text-wrapper-sv3duf|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-sv3duf\" style=\"margin: 0px; text-align: left;\">\n<ul>\n<li>Information Security Policy<\/li>\n<li>Information Assets Classification Policy<\/li>\n<li>Change Management Policy<\/li>\n<li>Acceptable Use Policy<\/li>\n<li>Access Control Policy<\/li>\n<li>Password Policy<\/li>\n<li>Backup and Recovery Policy<\/li>\n<li>Secure Development Policy<\/li>\n<li>Information Transfer Policy<\/li>\n<li>Data Retention Policy<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div id=\"sp-u4e6gt\" data-mobile-visibility=\"#sp-u4e6gt|false\" data-desktop-visibility=\"#sp-u4e6gt|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-jitxih\" data-mobile-css=\".sp-text-wrapper-jitxih, #sp-jitxih, #jitxih|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-jitxih|false\" data-desktop-visibility=\".sp-text-wrapper-jitxih|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-jitxih\" style=\"margin: 0px; text-align: left;\">\n<ul>\n<li>Disposal and Destruction Policy<\/li>\n<li>Information Security Policy for Supplier Relationships<\/li>\n<li>Security Audit Policy<\/li>\n<li>Business Continuity and Disaster Recovery Policy<\/li>\n<li>Physical Security Policy<\/li>\n<li>Antimalware Policy<\/li>\n<li>Policy on The Use of Cryptographic Controls<\/li>\n<li>Clear Desk and Clear Screen Policy<\/li>\n<li>Wireless Security Policy<\/li>\n<li>Remote Access Policy<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"sp-wonrwk\" data-mobile-visibility=\"#sp-wonrwk|false\" data-desktop-visibility=\"#sp-wonrwk|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-msah5c\" data-mobile-visibility=\"#sp-msah5c|false\" data-desktop-visibility=\"#sp-msah5c|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"h4jd3x\" data-mobile-css=\".sp-text-wrapper-h4jd3x, #sp-h4jd3x, #h4jd3x|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-h4jd3x|false\" data-desktop-visibility=\".sp-text-wrapper-h4jd3x|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-h4jd3x mce-content-body html4-captions\"  style=\"margin: 0px; text-align: left; position: relative;\" >\n<p>Please note that provided policy templates are quite generic and cannot entirely cover all the peculiarities related you your organization. Therefore, later adjustment to the actual business processes, deployed infrastructure and organizational roles could be required.<\/p>\n<p>If you need some support with filling-in the templates please take our customization services and we will help with tailoring documentation to your company needs.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-evgf84\" data-mobile-visibility=\"#sp-evgf84|false\" data-desktop-visibility=\"#sp-evgf84|false\" class=\"sp-el-section \" style=\"background-color: rgb(11, 11, 69); width: 100%; max-width: 100%;\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-kup7v3\" data-mobile-visibility=\"#sp-kup7v3|false\" data-desktop-visibility=\"#sp-kup7v3|false\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-zfmkq7\" data-mobile-visibility=\"#sp-zfmkq7|false\" data-desktop-visibility=\"#sp-zfmkq7|false\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 0px);\">\n<pre data-mobile-css=\"\"><\/pre>\n<div id=\"sp-c89yaz\" data-mobile-css=\".sp-text-wrapper-c89yaz, #sp-c89yaz, #c89yaz|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-c89yaz|false\" data-desktop-visibility=\".sp-text-wrapper-c89yaz|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-c89yaz\" style=\"color: rgb(255, 255, 255); margin: 0px; text-align: left;\">\n<p>\u00a9 Copyright 2022 Cyberadviser O\u00dc &#8211; CyberAdviser Store<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>CYBERADVISER Schedule a call Based on collection of comprehensive information security documents, the Security and Privacy Management Framework (SPMF) helps establishing a compliance with many information security and privacy management systems. Using a single unified set of policies, Cyberadviser&#8217;s SPMF compliance is aimed at addressing ISO 27001, ISF SOGP, CSA standards. Any organization may create &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/pages\/152"}],"collection":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":15,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/pages\/152\/revisions"}],"predecessor-version":[{"id":990,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/pages\/152\/revisions\/990"}],"wp:attachment":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/media?parent=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}