Select templates to compare side-by-side and find the perfect fit for your needs
Simplified guide to key AI regulations globally including EU AI Act, US Executive Order 14110, GDPR, CCPA, and more. Understand requirements without legal jargon. Includes compliance status tracking.
Maintain a complete inventory of all AI systems in your organization. Track system details, compliance status, audit dates, and ownership. Essential for governance and compliance.
Identify, assess, and mitigate risks associated with your AI systems. Includes risk categories, assessment methodology, and mitigation strategies. Practical tool for managing AI responsibly.
Establish a framework for responsible AI development and deployment. Includes governance structure, key principles, roles & responsibilities, and approval processes. SME-friendly and straightforward.
Change management procedure for controlling and implementing organizational, process, and system changes.
Quality management system documentation covering quality objectives, processes, controls, and continuous improvement.
Information technology security policy covering data protection, access control, system security, and incident response.
EHS policy covering workplace safety, environmental compliance, hazard management, and employee health protection.
Comprehensive procurement policy covering vendor selection, purchase authorization, contract management, and compliance requirements.
Monitor vendor compliance and performance over time. Track audit findings, compliance status, and remediation actions to ensure continuous vendor accountability.
Evaluate your security posture and identify vulnerabilities. Includes assessment of access control, data protection, system security, and compliance with comprehensive guidance.
Track incidents, near-misses, and operational failures. Document root causes, immediate actions, and preventive measures to improve operational resilience.
Manage vendor and supplier risks. Track vendor security, compliance, performance, and identify backup vendors to reduce supply chain vulnerabilities.
Identify and manage IT and cybersecurity risks. Includes data security, backup systems, access control, and system reliability risks with practical mitigation strategies.
Track regulatory requirements and ensure business compliance. Includes common regulations, audit schedules, and remediation tracking for SMEs.
Comprehensive risk identification, assessment, and tracking template with detailed guidance for SMEs. Includes scoring methodology, mitigation strategies, and investor-ready fields.
Template for defining RTO and RPO for critical systems
Communication procedures during business disruptions
Template for conducting and documenting security assessments
Template for conducting business impact analysis
Step-by-step disaster recovery procedures and checklists
Comprehensive business continuity and disaster recovery plan
Cybersecurity incident response and management procedures
User access management and control procedures
Framework for classifying and protecting sensitive data
Comprehensive information security policy framework
Controls and approval procedures for journal entries
Quarterly audit committee reporting template
Month-end and year-end financial close procedures
Standard reconciliation procedures for financial accounts
Template for documenting segregation of duties controls
Framework for assessing effectiveness of internal controls
Professional management letter for audit communications
Comprehensive annual internal audit plan template
Standardized audit work papers for consistent documentation
Track and manage audit findings and remediation actions
Step-by-step guide for implementing ISO 27001 information security standard
Template for tracking employee compliance training completion
Annual compliance calendar tracking key regulatory deadlines
Sarbanes-Oxley compliance requirements and documentation
Comprehensive checklist for GDPR compliance requirements
Template for developing and tracking risk mitigation actions
Enterprise-wide operational risk management policy
Framework for analyzing risks in critical business processes
Detailed risk register for tracking and monitoring organizational risks
Comprehensive framework for identifying, analyzing, and prioritizing operational risks