Healthcare Data Protection Pack

Healthcare Data Protection Pack

Healthcare Data Protection Pack

Regular price $797.00
/
  • Start Now With Instant Download
  • One Time Payment
  • Unlimited Email and Chat Support

ISO 27001:2022 Implementation Toolkit

ISMS Policies
1. Acceptable Use Policy
2. Access Control Policy
3. Asset and Information Management
4. Asset Management Policy
5. Business Continuity Plan
6. BYOD Policy
7. BYOD User Acknowledgement And Agreement
8. Capacity Management Policy
9. Clean Desk Standard Policy
10. Cloud Computing Policy
11. Communication Procedure
12. Cryptographic Controls Policy
13. Data Backup And Recovery Policy
14. Data Protection and Privacy Policy
15. Data Transfer Agreement
16. Disaster And Recovery Plan
17. Disposal And Destruction Policy
18. Document and Record Control Procedure
19. Human Resource Security Policy
20. Information Asset Register
21. Information Classification Policy
22. Information Transfer Policy
23. ISMS Manual
24. ISMS Policy
25. Mobile And Devices Teleworking Policy
26. Monitoring And Logging Policy
27. Monitoring And Measuring Policy
28. Networks Security Design
29. Password Policy
30. Patch Management And System Updates Policy
31. Physical Protection Policy
32. Project Management Policy
33. Protection Against Malware Policy
34. Remote Working Policy
35. Roles and Responsibilities in ISMS
36. Secure System Architecture and Engineering Principles
37. Security Roadmap
38. Server Patch Management Checklist
39. Threat Intelligent Policy
40. Threat Management Policy

Internal Audit
41. Annual Internal Audit Program
42. Audit Calendar
43. Audit Non Conformity Report
44. Internal Audit Checklist Excel
45. Internal Audit Dashboard
46. Internal Audit Plan
47. Internal Audit Procedure
48. Internal Audit Process
49. Internal Audit Report
50. Non Conformity And Corrective Action Procedure

Risk Management
51. RASCI Matrix
52. Information Security Risk Register

Incident Management
53. Incident Log
54. Incident Management Procedure
55. Incident Report
56. Security Incident Management Process
57. Vulnerability Management Process Flow Chart
58. Vulnerability Management Tracking Spreadsheet

Management Review
59. Management Review Agenda
60. Management Review Minutes of Meeting

Change Management
61. Change Control Form
62. Change Management Policy
63. Change Management Process Checklist
64. Change Request Form
65. Change Request Log

Implementation and Planning
66. Excel Implementation Plan
67. Project Plan (27001)
68. Transition Pack
69.ISO 27001 Implementation Process Document

Mandatory Documents
70. Agreements, NDAs, and Specifying Responsibilities in each Security Policy and Procedure
71. Information Security Policy
72. Internal Audit Status Report
73. ISMS Scope Document
74. IT Asset Register
75. Legal Regulatory Contractual Requirements Policy
76. Risk Management Procedure
77. Risk Treatment Plan
78. Secure Development Policy
79. Statement Of Applicability

GDPR Implementation Toolkit

1. Data Retention Policy
2. Data Retention Schedule
3. EU GDPR Readiness Assessment
4. Employee Privacy Notice
5. Supplier Employee Privacy Notice
6. Register of Privacy Notices
7. Data Protection Officer Job Description
8. Data Protection Officer Appointment Letter
9. Data Protection Officer Terms of Appointment
10. Website Privacy Policy
11. Website Terms & Conditions
12. Cookie Policy
13. Guidelines for Data Inventory and Processing Activities Mapping
14. Inventory of Processing Activities
15. Data Protection Impact Assessment Methodology
16. DPIA Register
17. Data Breach Response and Notification Procedure
18. Data Subject Consent Form
19. Data Subject Access Request Form
20. Data Subject Disclosure Form
21.IT Security Policy
22. Security Procedures For IT Department
23. Bring Your Own Device(BYOD) Policy
24. Mobile Device and Teleworking Policy
25. Clear Desk and Clear Screen Policy
26. Information Classification Policy
27. Anonymization and pseudonymization Policy
28. Policy on the use of Encryption
29. Disaster Recover Plan
30. Internal Audit Procedure
31. Appendix-ISO 27001 Internal Audit Checklist
32. Project Plan for Complying with the EU GDPR
33. Privacy Notice
34. Data Subject Consent Withdrawal Form
35. Parental Consent Form
36. Parental Consent Withdrawal Form
37. Access Control Policy
38. Security Procedures for IT Department
39. Data Breach Register
40. Data Breach Notification Form to the Supervisory Authority
41. GDPR Response to DSAR
42. Confirmation for Erasure Data
43. GDPR Agreement for the Appointment of an EU Representative.
44. GDPR Confirmation for Closed DSAR
45. Standard Contractual Clauses for the Transfer of Personal Data Controller to Controller
46. Standard Contractual Clauses for the Transfer of Personal Data Controller to Processor
47. Standard Contractual Clauses for the Transfer of Personal Data Processor to Processor
48. Standard Contractual Clauses for the Transfer of Personal Data Processor to Controller
49. Confirmation of Data Subject Access Request Procedure
50. Confirmation of Data Subject Rights Request
51. Controller to Controller Data Processing Agreement
52. Cover Letter to Portability Response
53. Cross Border Personal Data Transfer Procedure
54. Data Breach Notification Form to Data Subjects
55. Data Subject Requests Communication Register
56. Employee personal data protection policy
57. Personal Data Protection Policy
58. Rejection of Unfounded or Excessive Request
59. Request Closing Letter
60. Request for Confirmation of Authority
61. Response on Auto Decision Making-Restriction on Processing-Accepted
62. Response on Auto Decision Making-Restriction on Processing-Rejected
63. Response on Consent Withdrawal - Restriction Request - Accepted
64. Response on Consent Withdrawal - Restriction Request - Rejected
65. Response on Processing Restriction Request - Complaint - Accepted
66. Response on Processing Restriction Request - Complaint - Rejected
67. Response to Rectification of Data Request
68. GDPR Supplier Data Processing Agreement Version A
69. GDPR Supplier Data Processing Agreement Version B
70. Processor GDPR Compliance Questionnaire

NIST CSF 2.0 Implementation Toolkit

1. Acceptable Use Policy
2. Access and Account Management Policy
3. Asset Disposal and Sanitization Policy
4. Business Continuity Plan with Office Operation
5. Business Continuity Plan for remote only operation
6. Change and Patch Management Policy
7. Data Encryption Policy
8. Data Retention and Destruction Policy
9. Disaster Recovery Plan
10. Governance, Risk, And Compliance Management Policy
11. HR Security Policy
12. Incident Response Plan
13. Information Security Management Program
14. Information Security Policy
15. Information Security Risk Management Framework
16. Mobile Device Management and Remote Access Policy
17. NIST CSF Excel Implementation
18. NIST CSF Excel Project Checklist
19. NIST CSF Internal Audit Status Report
20. NIST CSF Management Review Agenda
21. Personal Data Protection Policy
22. Physical Security Policy
23. Risk Assessment tool NIST CSF MAPPINGS
24. Secure Configuration and System Hardening Policy
25. Secure Software Development Life Cycle
26. Security Audit and Monitoring Policy
27. Security Awareness Training Policy
28. Systems and Network Security Policy
29. Third-Party Security Management Policy
30. Third-Party Security Management Procedure
31. Third-party Information Security Risk Assessment Questionnaire
32. Vulnerability Management Policy

Welcome to ISO Docs. Our priority at ISO Docs is to provide high-quality templates and help our customers be efficient. Our goal is to create quality templates so that our customers can avoid rework and focus on their actual jobs rather than doing everything from scratch. We have dedicated support ready to assist you in any way we can.

YES, our store is powered by Shopify which is one of the most trusted e-commerce platforms. Shopify is certified Level 1 PCI DSS compliant. All Shopify stores include an SSL certificate that uses industry standard 256-bit encryption technology. This is the same level of encryption used by large banks to keep your information secure.  

2. Will I get support if I have an issue or a query?

Definitely, yes, we have a dedicated support team who will happily assist. It can be an issue or any help with our templates. Our support policy is to address the customer query ASAP regardless of the product they purchase.  

3. Is this a one time payment or monthly membership?

All our products are ONE TIME PAYMENT. We do not offer subscriptions so whatever you pay will be be one time.  

4. How do I access my downloads?

After you checkout, you will be taken to a download page. You will also get a download link in your email.

5. What if the download link does not work?

Sometimes links can be blocked by a corporate firewall so please try using the link from a different network or from home. If you still cannot access drop an email to support@iso-docs.com and use our Contact Us Page.  

6. Do you provide refunds?

We will REFUND the full amount in the following scenarios - 

  1. Templates don't work as described, and we cannot fix your problem in a reasonable time. 
  2. Templates are missing from your download and we cannot provide you the same templates shown on the site.
  3. You are not able to access the download. We will try to provide different mediums but if none of them work for you then we will refund your amount. Check our Refund Policy.  

What are the different types of payments accepted?

We accept PayPal, Apple Pay, Google Pay, Master Card , Amex and VISA. 

8. Do these templates work with Excel?

Yes, the templates are built using MS Office so will work on Excel.

9. Can the templates be customized or edited?

Yes, our templates can be edited and changed as you need. But reselling of templates is not allowed.

10. Why do you have a logo on the documents?

The ITIL Docs logo is only visible on the template images. We do not use logos on templates so you can customize the template as needed.

11. How will I get my FREE monthly updates?

We will send download links to your email in the first few days of the month. We will send it to the email provided when making the purchase.

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.

You may also likeISO Templates and Documents Download
Recently viewed