The Morning Breach has designed the following resources to assist business owners achieve a higher level of cyber security compliance. The following files are templates and should be customized for your business with the consultation of your technology department or vendor. If you have any questions please email us at This email address is being protected from spambots. You need JavaScript enabled to view it..
Acceptable Use Policy - Download
The purpose of this policy is to outline the acceptable use of technology resources at COMPANY at the office or remotely. These rules are in place to protect the individual and COMPANY. Inappropriate use exposes COMPANY to risks including virus attacks, compromise of network systems and services, and legal issues.
Data Classification Policy - Download
The purpose of this policy is to establish a framework for classifying data based on its sensitivity, value and criticality to the organization, so sensitive corporate and customer data can be secured appropriately.
Data Management Plan - Download
The purpose of this policy is to gather and use certain data which contains information on customers, suppliers, business contacts, employees, or other propriety and confidential data held by the company. The policy describes how this data must be collected, handled, and stored to meet data protection standards and comply with the law.
Data Security Vendor Questionnaire - Download
The Data Security Vendor Questionnaire is a standard form that you can provide to your vendors to learn each vendors security footprint.
Technology Org Chart - Download
The Technology Org Chart is a visual way to outline and and see what and where your data resides.