Incomplete Playbooks

These are playbooks for operationalizing policies that still need some polish before they can be publicly consumed.

The underlying policies must still be adhered to. If you have any questions about how act in compliance with one of our policies, ask your manager.

Playbooks

Acceptable Use

Acceptable use of end-user computing devices and technology

Backup

Protection of the confidentiality, integrity, and availability of Narrative-Owned Data

Business Continuity

Recover following a disruption in conjunction with the Disaster Recovery Plan

Code of Conduct

Standards of ethical business conduct

Data Classification

Information classification and handling guidelines

Data Protection

Support data protection

Data Retention

Manage the retention and deletion of customer Data

Disaster Recovery

Recover Narrative following a disruption resulting from a disaster

Encryption

Protect the confidentiality, integrity, authenticity, and nonrepudiation of information

Incident Response

Ensure detection and reaction of security vulnerabilities, incidents and security breaches

Physical Security

Security of physical facilities

Risk Assessment

Methodology for the assessment and treatment of information security risks