Information security
Information security policy
An information security policy matters when the right people know the current rules. Akcepta helps move from a PDF file to documented rollout.
Problem
Why the document alone is not enough?
The policy may exist in a folder, but the company may not know who read it, who acknowledged it and whether the acknowledgement relates to the current version.
During an incident, audit or client review, you may need to show that security rules were formally communicated to the team.
Workflow
What to do after preparing the document?
- Upload the information security policy.
- Approve the version and select recipients.
- Send it for acknowledgement.
- Keep the report as evidence.
Akcepta
How Akcepta helps in this scenario?
Akcepta helps roll out an information security policy with version, recipient list and acknowledgement report.
- check_circledocument version, metadata and approval in one place
- check_circlerecipient campaign and acknowledgement statuses
- check_circleevidence report ready for review or audit
FAQ
Frequently asked questions
Does Akcepta create the document content?
keyboard_arrow_down
Are acknowledgements linked to a specific version?
keyboard_arrow_down
Can we start with one document?
keyboard_arrow_down