top of page

SOPwerks.

CONTENT LIBRARy

The following list shows some of our current Standard Operating Procedures, and those being added soon.... This list is subject to change as monthly updates are performed. 

MSP PROCESS

  • Alert Handling & Escalation

  • Asset Management

  • Backup & Recovery Procedure

  • Business Continuity Plan

  • Change Management

  • Client Communication

  • Client Onboarding 

  • Client Offboarding

  • Dispatch Procedure

  • HR: Employee Termination Procedure 

  • HR: Employee Separation Checklist 

  • HR: Performance Improvement Plan 

  • Incident Handling

  • Monitoring & Alerts Configuration

  • On-call Procedure

  • Patch Management

  • Project Management Methodology 

  • Quote Requests 

  • Ticket Lifecycle

  • Unplanned Outages

  • vCIO Strategic Meeting Prep & Template 

  • vCIO Client Annual Budget Plan & Template 

IT POLICIES

  • Acceptable Use Policy

  • Bring Your Own Device Policy 

  • Clean Desk Policy

  • Endpoint Security Policy  

  • Email Protection Policy

  • Email Use Policy

  • Ethics Policy

  • Firewall Standards 

  • IT Document Management

  • Network Configuration Standards 

  • Pandemic Response Planning Policy

  • Password Protection Policy

  • Password Construction Guidelines

  • Ransomware Threat Prevention & Response Plan 

  • Risk Acceptance Policy 

  • Security Response Plan

  • Server Hardening

  • Software Acquisition & Installation Policy

  • Technology Hardware Purchase Policy

  • Vendor Selection

  • WIFI Technical Standards 
     

HIPAA / HITECH

  • Access Authorization 

  • Access Control and Validation Procedures 

  • Applications and Data Criticality

  • Breach Training Policy for Employees 

  • Contingency Plan 

  • Data Backup Policy 

  • Encryption Policy 

  • Facility Access Controls Policy 

  • Facility Security Plan Policy

  • HIPAA Violation Sanction Policy 

  • Information System Activity Review Policy 

  • Job Descriptions and Responsibilities 

  • Maintenance Records Policy 

  • Password Policy 

  • Person or Entity Authentication 

  • Protection from Malicious Software Policy

  • Risk Analysis Policy 

  • Risk Management Policy 

  • Security Awareness Training Policy 

  • Security Measures for Access Control 

  • Security Incident Response Plans

  • Technical Safeguards – Access Control Policy

  • Termination Policy

  • Transmission Security Policy 

  • Wireless Security Policy

  • Workstation Security Policy 

GDPR

  • Data Privacy Impact Assessment (DPIA) 

  • Data Protection Officer Job Description  

  • Data Protection Policy 

  • Data Retention Policy 

  • Data Retention Schedule 

  • Data Subject Consent Form 

  • Employee Privacy Notice 

  • Inventory of Processing Activities

  • Parental Consent Form 

  • Privacy Notice 

  • Standard Contractual Clauses for the Transfer of Personal Data to Controllers 

  • Standard Contractual Clauses for the Transfer of Personal Data to Processors 
  • Supplier Data Processing Agreement 

  • Data Breach Response and Notification Procedure 

  • Data Breach Register 

  • Data Breach Notification Form to the Supervisory Authority 

  • Data Breach Notification Form to Data Subjects 

PCI-DSS

  • Firewall Requirements Policy

  • Protect Cardholder Data

  • Firewall and Router Configuration Policy

NIST CyberSecurity Framework

  • NIST CyberSecurity Framework 

  • 802.11 Wireless Network Security Standard  

  • Acceptable Use of Information Technology 

  • Access Control Policy 

  • Account Management / Access Control Policy

  • Acquisition Assessment Policy

  • Change Management Policy 

  • Computer Security Threat Response Policy 

  • Cyber Incident Response Standard 

  • Encryption Standard

  • Identification and Authentication Policy 

  • Incident Response Policy 

  • Information Classification Standard  

  • Information Security Policy

  • Information Security Risk Management Standard

  • Mobile Device Security Standard 

  • Patch Management Policy

  • Personnel Security Policy 

  • Remote Access Policy

  • Risk Assessment Policy 

  • Sanitization / Secure Disposal Standard (NEW)

  • Secure Coding Standard 

  • Secure Configuration Standard 

  • Secure System Development Lifecycle 

  • Security Awareness and Training Policy

  • Security Logging Standard 

  • Security Response Plan Policy 

  • Security Risk Assessment and Authorization Policy

  • System and Communications Protection Policy

  • System and Services Acquisition Policy 

bottom of page