top of page
MPA TPN Cyber Security Policy Templates

​MPA Content Security Best Practices
Aligned Security Manual & Policies

What's Included

Our Governance Risk & Compliance (GRC) Policy Start Pack is a great way for service providers, vendors, and facilities in the media and entertainment industry supply chain to begin building a comprehensive set of cybersecurity policies and procedures to meet compliance and audit requirements. Use the pack to form the basis of the policies and procedures you might supply an auditor or assessor as part of your TPN Gold Shield Assessment.

​What's included in the
GRC Policy Starter Pack for US$495

Security Manual

Information Security Manual (21 pages) customised with your facility logo (branding) and contact details designed to cover all aspects of your facility's ISMS implementation and operation.

Policy Templates

Ten (10) policy templates customised with your facility logo (branding) and contact details:

  • Acceptable Use Laptops Mobile & Recording Devices Policy (15 pages)

  • Data Breach & Incident Response (11 pages)

  • Non-Disclosure Agreement (8 pages)

  • Password Policy (9 pages)

  • Personnel On-boarding (7 pages)

  • Personnel Off-boarding (8 pages)

  • Remote Working / Work from Home Policy (10 pages)

  • Risk Assessment & Management Policy (8 pages)

  • Security Hardening Policy (9 pages)

  • Social Media Policy (8 pages)

ISMS Implementation Guide

  • ISMS Implementation Guide incorporating Bootstrap Tasks, Implementation Tasks and Program Calendar with MPA Content Security Best Practices control mappings

  • Example Facility Organisational Chart showing where key governance and security teams reside in the hierarchy

  • Example Risk Register showing how to catalogue, rate, and treat identified risk items 

  • Most recent version of the MPA Content Security Objectives and Methodology*

  • Most recent versions of the MPA Content Security Best Practices*

Buy Policy Templates

How to Purchase

1. REQUEST A QUOTE

Request a quote and we will issue you with an invoice for the GRC Policy Starter Pack.

3. RECEIVE BRANDED POLICY DOCUMENTS

Branded policy documents are delivered to you within 2 business days. Documents are in PDF and DOCX formats so you can edit them or create new or additional policies based on your governance and compliance needs.

REQUEST A QUOTE

Please complete the form below to receive a quote for the TPN+ GRC Policy Starter Pack. Please ensure you use your company email address and phone number.

Thanks, we will be in touch with you shortly.

Prefer to have a chat? Call us on
+61 439 876 057

Important Notes:

  • The TPN GRC Policy Starter Pack is designed to provide an affordable solution to get your governance, risk, and compliance program underway (10 Policy Templates and 1 Security Manual)

  • Ensure you read the "README-1ST" document to understand how the policy pack is constructed and what additional policies you might be required to develop

  • If you need assistance developing additional policies for your facility don’t hesitate to contact us

  • When you purchase the templates, you are purchasing a digital product and not a legal service

  • Due to the digital nature of this product, once delivered to you via email, there is no refund

  • The GRC Policy Starter Pack price is in USD and is exclusive of any taxes

  • *Note that the MPA Content Security Best Practices are not sold. They are free and included for convenience in the GRC Policy Starter Pack that is delivered to you.

 

Cybersecurity policies we can help
develop for your organisation

We can provide support in developing additional policies for your organisation if you wish to expand your policy bank. These policies will be customized to meet your organisation's specific needs. Please be aware that the policies listed below are not included in the TPN+ GRC Policy Starter Pack mentioned earlier.

Browse Policy Templates

Corporate Governance Policy Templates

  1. Company Structure

  2. Segregation of Duties

  3. Machine Room, Data Center, Vault, Safe Access List

  4. VPN Access List

  5. Non-Disclosure Agreement

  6. Social Media Policy

  7. Personnel On-boarding

  8. Personnel Off-boarding

  9. Anonymous Reporting

  10. Client Security Requirements

  11. Security Management Team Roles, Responsibilities, Activities

  12. Incident Response Team Roles, Responsibilities, Activities

  13. Data Breach and Incident Response and Notification

 

Employees, Freelancers, Third-Parties Policy Templates

  1. New hires and terminations for the last 12-months

  2. Employee Non-Disclosure Agreement

  3. Freelancer / Third-Party Non-Disclosure Agreement

  4. Visitor Non-Disclosure Agreement

  5. Acceptable Use

  6. Conditions of Employment

  7. Employee ID

  8. Third-Party Personnel Monitoring

  9. Employee Termination Checklist

 

Visitors Policy Templates

  1. Visitor Escort Policy

  2. Visitor ID

 

Risk Assessment Policy Templates

  1. Risk Assessment Negative Scenarios

  2. Business Continuity Plan

  3. Disaster Recovery Plan

Facility Policy Templates

  1. Facility and Data Centre Floor Plate

  2. List of Entrance and Exit Points

  3. Power Outage Contingency Plan

  4. Temperature and Humidity Monitoring

  5. Key / Prox Card / Fob / Biometric Issuance, Update, Review

 

Infrastructure Policy Templates

  1. Infrastructure Inventory

  2. Digital Devices Use

  3. Mobile Phone Use

  4. CCTV Verification

  5. Network, VPN, Infrastructure, Storage Architecture Diagrams

  6. Network Connection Review

  7. Risk Assessment Penetration Test

  8. Firewall Management and Alerting

  9. Computing Device Secure Configuration and Hardening

  10. Workstation Hardening

  11. Server Hardening

  12. Network and Communications Hardening

  13. Storage Hardening

  14. Change Management

  15. Patch Management

  16. Vulnerability Assessment

  17. Open Switch Ports

  18. Security Log Review

  19. VPN Access Log Review

  20. Directory Account Creation / Management

  21. Password Policy

  22. Backup and Recovery

 

Workflow Policy Templates

  1. Content Ingest, Logging, Tracking, Internal Processing, Delivery Workflow

  2. Content Destruction

  3. Content Transfer / Approvals

 

Training Policy Templates

  1. Senior Management Security Obligations

  2. Security Awareness Training Program

bottom of page