This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit

Policy Document

Access Control Policy

November 25, 2020 | Beyond Simple Passwords, Control Access

This sample policy will assist your organization in documenting the controls in place that prevent unauthorized access to information assets and protect the information in those assets against unauthorized access. 

In an effort to arm and empower businesses with free tools to help keep their businesses secure from cyber threats, the policy below was provided as a courtesy by the New York State Department of Financial Services (DFS) and is provided on an “as is” basis.  This policy is intended for information purposes only and does not constitute legal advice. It contains sample text and is customizable to suit your organization. DFS assumes no liability or responsibility for any errors or omissions in the content, including as a result of changes to DFS’s regulations since the date of this policy. Some elements may not be practical for every organization and more may be required.

You can download the template by clicking “Read More” below.

Read More
Back to Resources
  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Third Party Tool
Policy Document
Instructions
Third Party Scan
Video

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/