<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[PolicyCo’s Newsletter]]></title><description><![CDATA[PolicyCo invites you to write, approve, release, test and improve...Together.]]></description><link>https://blog.policyco.io</link><image><url>https://substackcdn.com/image/fetch/$s_!z6ws!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F658b7f9c-3d5d-493b-a261-60da68920c10_480x480.png</url><title>PolicyCo’s Newsletter</title><link>https://blog.policyco.io</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 12:42:39 GMT</lastBuildDate><atom:link href="https://blog.policyco.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[PolicyCo]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[policyco@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[policyco@substack.com]]></itunes:email><itunes:name><![CDATA[PolicyCo]]></itunes:name></itunes:owner><itunes:author><![CDATA[PolicyCo]]></itunes:author><googleplay:owner><![CDATA[policyco@substack.com]]></googleplay:owner><googleplay:email><![CDATA[policyco@substack.com]]></googleplay:email><googleplay:author><![CDATA[PolicyCo]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Your Policies Just Learned to Talk Back]]></title><description><![CDATA[Something has shifted in how people work with software.]]></description><link>https://blog.policyco.io/p/your-policies-just-learned-to-talk</link><guid isPermaLink="false">https://blog.policyco.io/p/your-policies-just-learned-to-talk</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Thu, 26 Mar 2026 23:01:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Z1YW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Z1YW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Z1YW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Z1YW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Z1YW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Z1YW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Z1YW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png" width="724" height="724" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:4631680,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.policyco.io/i/191996562?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Z1YW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Z1YW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Z1YW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Z1YW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6b9beb-be45-4e39-a276-24cea5311f8d_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Something has shifted in how people work with software. Over the past year, AI chat agents have gone from novelty to daily driver. Teams are using tools like Claude, ChatGPT, and Copilot not just to draft emails or summarize documents, but to pull real answers from real data, in real time, without switching tabs or hunting through dashboards.</p><p>The connective tissue behind this shift is a standard called MCP &#8212; the Model Context Protocol. Think of MCP as a universal adapter that lets AI agents plug into the tools and platforms your team already uses. If APIs are the plumbing that lets software systems exchange data, MCP is the fitting that lets an AI agent turn on the faucet. It gives agents structured, permissioned access to your data so they can do something useful with it &#8212; not just parrot back what&#8217;s on your screen, but actually reason over what&#8217;s behind it.</p><p>Today, we&#8217;re bringing that capability to PolicyCo.</p><h2>Meet the PolicyCo MCP Connector</h2><p>The PolicyCo MCP Connector lets AI agents connect directly to your PolicyCo environment. That means your team can interact with policies and procedures from inside their chat agent &#8212; Claude, for example &#8212; without ever leaving the conversation to open the platform.</p><p>Right now, the connector supports foundational capabilities: listing policies and procedures, searching across your document library, and asking natural-language questions about the content of those documents. Need to know what your data retention policy says about third-party processors? Ask your agent. Want to pull up the onboarding procedures for a specific department? Same thing.</p><p>But what makes this genuinely powerful isn&#8217;t just convenience. It&#8217;s what happens when an AI agent has structured access to the relationships PolicyCo already maintains between your policies, procedures, and controls.</p><h2>Why Relationships Matter</h2><p>Most organizations manage policies as isolated documents &#8212; PDFs in a shared drive, pages in a wiki, maybe a spreadsheet mapping controls to frameworks. The problem isn&#8217;t just that it&#8217;s tedious. It&#8217;s that the connections between documents exist only in someone&#8217;s head, or worse, in no one&#8217;s head at all.</p><p>PolicyCo is built differently. Every policy connects to related procedures. Procedures map to controls. Controls tie back to compliance frameworks. These aren&#8217;t loose references; they&#8217;re structured, maintained relationships that reflect how your compliance program actually works.</p><p>When an AI agent can access that relationship graph, it stops being a search tool and starts being an analyst. It can trace a question about a single procedure upstream to the policy that governs it and downstream to the evidence that supports it. It can surface connections across documents that would take a human hours to piece together manually.</p><h2>Where We&#8217;re Headed</h2><p>This initial release is deliberately focused. We want to get the foundation right and let real usage guide what comes next. On the roadmap: deeper analytical capabilities around risk exposure, gap identification, and cross-framework coverage &#8212; the kind of bespoke reporting that turns a policy library into a strategic asset.</p><p>The goal hasn&#8217;t changed. PolicyCo exists to give organizations a smarter way to manage policies and procedures &#8212; one built on structured relationships that can be mined for clarity, maintained as you grow, and now, queried conversationally through the tools your team already uses every day.</p><p><strong>The PolicyCo MCP Connector is available now. <a href="https://policyco.io?utm_term=mcp&amp;utm_medium=blog&amp;utm_source=substack">Connect</a> your account and start asking questions.</strong></p>]]></content:encoded></item><item><title><![CDATA[Your Compliance Vendor Should Know Your Name]]></title><description><![CDATA[There&#8217;s a growing trend in SaaS: replace every human touchpoint with a chatbot, staff support teams as thin as possible, and hope customers figure it out on their own.]]></description><link>https://blog.policyco.io/p/your-compliance-vendor-should-know</link><guid isPermaLink="false">https://blog.policyco.io/p/your-compliance-vendor-should-know</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Mon, 23 Mar 2026 17:40:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FBr-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FBr-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FBr-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 424w, https://substackcdn.com/image/fetch/$s_!FBr-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 848w, https://substackcdn.com/image/fetch/$s_!FBr-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!FBr-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FBr-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8529292,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.policyco.io/i/191891241?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FBr-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 424w, https://substackcdn.com/image/fetch/$s_!FBr-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 848w, https://substackcdn.com/image/fetch/$s_!FBr-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!FBr-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd14ccdb9-0b99-4aff-b0d3-fa2b092437d7_2048x2048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s a growing trend in SaaS: replace every human touchpoint with a chatbot, staff support teams as thin as possible, and hope customers figure it out on their own. For compliance software &#8212; where the stakes include audit failures, regulatory penalties, and organizational risk &#8212; that approach isn&#8217;t just frustrating. It&#8217;s negligent.</p><p>At PolicyCo, we made a deliberate choice to build something different. Not a platform that serves thousands of anonymous accounts, but a partner that knows your team, your compliance goals, and the specific challenges keeping you up at night.</p><h2>Real People, Not Ticket Queues</h2><p>When you have a question about PolicyCo, you reach a dedicated support resource who already understands your environment. They know which frameworks you&#8217;re mapping to, how your organization structures its policies, and where you are in your compliance journey. That means fewer explanations on your end and faster, more relevant answers &#8212; including hands-on help configuring your workspace when you need it.</p><p>This isn&#8217;t a luxury tier or an upsell. It&#8217;s how we operate for every customer.</p><h2>Training That Respects Your Time</h2><p>Our onboarding and training sessions are led by humans who can read the room, adjust to your team&#8217;s experience level, and field the unexpected questions that inevitably surface when compliance meets reality. We build in extensive Q&amp;A because we&#8217;ve learned that the most valuable insights emerge from unscripted conversations &#8212; the edge cases your team encounters daily that no knowledge base article will ever cover.</p><h2>Your Feedback Shapes the Product</h2><p>When you submit a feature request or report a bug, it enters a transparent process with genuine two-way dialogue. You&#8217;ll hear back about prioritization decisions and timelines, not just a form confirmation that disappears into a backlog. Our product team is accessible because we believe the people using the software daily have the clearest view of what it should become next.</p><p>This feedback loop isn&#8217;t performative. Customers who look at our release notes regularly see their input reflected in the product.</p><h2>The Boutique Advantage</h2><p>We&#8217;re not trying to be the compliance vendor for every company on earth. PolicyCo is built for organizations that understand a compliance platform isn&#8217;t a commodity purchase &#8212; it&#8217;s an operational relationship that compounds in value over time. As your policies mature, your frameworks evolve, and your team grows, a vendor who has been in the room with you adapts in ways a self-serve platform simply cannot.</p><p>That long-term partnership creates something no AI agent or automated workflow can replicate: institutional knowledge about <em>your</em> organization that lives in the people who support you, not just the database that stores your documents.</p><h2>The Cost of Cheap Support</h2><p>Every hour your compliance team spends wrestling with unhelpful chatbots or waiting on undertrained support reps is an hour not spent strengthening your actual compliance posture. The vendors racing to cut human interaction from their cost structure are passing that cost directly to you &#8212; in wasted time, mounting frustration, and risk that quietly accumulates when questions go unanswered.</p><p>We&#8217;d rather invest in knowing our customers well than in scaling to customers we&#8217;ll never meet.</p><p>If your compliance program deserves more than a ticket number, <a href="https://policyco.io?utm_source=substack&amp;utm_medium=blog">let&#8217;s talk</a>.</p>]]></content:encoded></item><item><title><![CDATA[The Procedure That Almost Cost Us Everything]]></title><description><![CDATA[And the Feedback That Fixed It]]></description><link>https://blog.policyco.io/p/the-procedure-that-almost-cost-us</link><guid isPermaLink="false">https://blog.policyco.io/p/the-procedure-that-almost-cost-us</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Thu, 19 Feb 2026 04:27:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zx6P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zx6P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zx6P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!Zx6P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!Zx6P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!Zx6P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zx6P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8123743,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.policyco.io/i/188456250?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zx6P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!Zx6P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!Zx6P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!Zx6P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01f2c36d-b868-4516-bc9b-c1a733e6ccfa_3168x1344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sandra had been a home care coordinator at a regional nonprofit for eleven years. She knew the intake process cold. So when a new volunteer, David, called her confused about the emergency escalation steps in the updated onboarding procedure, she wasn&#8217;t worried. She walked him through it from memory.</p><p>Two weeks later, a client situation escalated. David followed the written procedure &#8212; not Maria&#8217;s verbal override &#8212; and called the wrong contact. Everyone was fine, eventually. But the incident report revealed something uncomfortable: the procedure itself was wrong. A phone number had changed six months ago. Nobody had updated the document.</p><p>David had noticed the number looked odd when he first read it. He had no way to say so.</p><div><hr></div><h2>The Gap Between the Reader and the Writer</h2><p>Procedures are written by people who understand a process deeply. They&#8217;re read by people who are closer to the work, often finding edge cases and real-world gaps that the author never encountered. Without a channel for that knowledge to travel upstream, organizations run on documents that drift further from reality with every passing month.</p><p>The solution isn&#8217;t a rating system. Ratings tell you that something&#8217;s wrong. They don&#8217;t tell you <em>what</em> or <em>how to fix it</em>. What you need is a voice &#8212; a structured way for the person reading a procedure to say: <em>this step is missing a decision point</em>, or <em>the contact here retired in March</em>, or <em>in our region, this works differently</em>.</p><div><hr></div><h2>Feedback as a Living Signal</h2><p>Imagine David, reading that escalation procedure on his first week, sees a small prompt: <em>Something missing or unclear? Let us know.</em> He types a note: <em>&#8220;The emergency number in Step 4 doesn&#8217;t match what&#8217;s posted at the front desk. Which one do we use?&#8221;</em></p><p>That comment doesn&#8217;t disappear into a void. It routes directly to the procedure owner &#8212; in this case, the Director of Care Operations. She sees it flagged in her queue, alongside the specific section David was reading when he wrote it.</p><p>She responds: <em>&#8220;Great catch, David. The front desk number is correct &#8212; we updated the system in Q3 but the procedure wasn&#8217;t synced. I&#8217;ll revise this week.&#8221;</em></p><p>That exchange matters. It&#8217;s not just a correction. It&#8217;s a signal that feedback is read, that the process is responsive, and that frontline workers have real influence over the tools they use. That signal makes the next person more likely to speak up.</p><div><hr></div><h2>From Comment to Release</h2><p>The Director revises Step 4, marks it for internal review, and a second set of eyes approves the change. The procedure moves to a new version &#8212; not a quiet overwrite, but a tracked revision with a change summary: <em>Updated emergency escalation contact to reflect Q3 staffing change. Flagged by onboarding volunteer.</em></p><p>Now the system does something important: it identifies everyone who previously attested to Version 1.2. They receive a notification. <em>This procedure has been updated. Please review the changes and re-acknowledge.</em></p><p>David gets one too. He reads the update, sees his name acknowledged in the change log, and signs off. The audit trail is clean. The organization can demonstrate, if ever asked, exactly when the error was discovered, how it was corrected, and who confirmed the updated version.</p><div><hr></div><h2>Closing the Loop Is the Product</h2><p>The feedback wasn&#8217;t the end of the story. It was the beginning of a process &#8212; comment, conversation, revision, release, attestation &#8212; that transformed a passive document into a living one.</p><p>Organizations that treat procedures as finished products the moment they&#8217;re published are accumulating invisible risk. The people closest to the work almost always know something the document doesn&#8217;t. The question is whether you&#8217;ve built a way for them to tell you.</p><p><a href="https://policyco.io?utm_source=substack&amp;utm_medium=blog">PolicyCo</a> makes that loop possible &#8212; from the first read to the final signature.</p>]]></content:encoded></item><item><title><![CDATA[How One Volunteer Coordinator Stopped Drowning in Procedure Chaos]]></title><description><![CDATA[Maria had a problem.]]></description><link>https://blog.policyco.io/p/how-one-volunteer-coordinator-stopped</link><guid isPermaLink="false">https://blog.policyco.io/p/how-one-volunteer-coordinator-stopped</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Wed, 28 Jan 2026 18:06:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dbYi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dbYi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dbYi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!dbYi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!dbYi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!dbYi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dbYi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7937384,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.policyco.io/i/186106832?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dbYi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!dbYi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!dbYi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!dbYi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61f37cca-bc05-40e5-950b-00a5395eab37_3168x1344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Maria had a problem. As the Operations Director for a regional conservation non-profit, she managed 500 field volunteers spread across 40 different programs&#8212;from wetland restoration crews to wildlife monitoring teams to community education ambassadors. Each program had its own set of procedures, roughly 25 per group on average. That&#8217;s 1,000 procedures, all living in a tangled web of Google Docs, shared drives, and email threads.</p><p>And every single one of them was a liability waiting to happen.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.policyco.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading PolicyCo&#8217;s Newsletter! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The Breaking Point</h2><p>The incident that finally pushed Maria to find a better solution wasn&#8217;t dramatic. A volunteer on the invasive species removal team used an outdated herbicide application procedure. The old version had been superseded three months earlier after new safety guidelines came out. The volunteer wasn&#8217;t negligent&#8212;they&#8217;d simply downloaded the procedure to their phone for offline access back in the spring and never thought to check for updates.</p><p>Fortunately, no one was hurt. But Maria spent the next two weeks fielding questions from the board, documenting the gap in their process, and wondering how many other outdated procedures were floating around in email inboxes and phone downloads across her 500-person volunteer network.</p><p>She knew the answer: probably dozens.</p><h2>The Hidden Complexity of Procedure Management</h2><p>Most people think procedure management is simple. You write a document, you share it, people follow it. But Maria had learned the hard way that effective procedure management actually involves solving several interconnected problems at once.</p><p>First, there&#8217;s the writing and approval process. Procedures don&#8217;t spring into existence fully formed. They start as drafts, get reviewed by subject matter experts, require sign-off from leadership, and often go through multiple revision cycles before they&#8217;re ready for distribution. Maria&#8217;s team had no consistent way to track where each procedure was in this pipeline. Draft versions sometimes got distributed accidentally. Approved versions sat in someone&#8217;s inbox for weeks before being shared.</p><p>Then there&#8217;s version control. When a procedure changes&#8212;and they always change&#8212;you need to know exactly what changed, when it changed, and why. Maria&#8217;s team used a naming convention with version numbers in the filename, but it was honored more in the breach than the observance. She&#8217;d find documents named &#8220;Volunteer_Safety_v3_FINAL_revised_ACTUAL.docx&#8221; and have no idea if it was newer or older than &#8220;Volunteer_Safety_v4_draft.docx.&#8221; The history of how a procedure evolved over time was essentially lost.</p><p>Distribution presents its own challenges. Not every volunteer needs every procedure. The wildlife monitoring team doesn&#8217;t need the community event setup checklist. The education ambassadors don&#8217;t need the chainsaw safety protocol. Maria needed to get the right procedures to the right people&#8212;and only those people. With 40 different volunteer groups, each with different procedure sets, maintaining accurate distribution lists was nearly a full-time job.</p><p>Finally, and perhaps most critically, there&#8217;s the question of acknowledgment. Sending a procedure isn&#8217;t the same as someone reading it. Maria could email an updated procedure to 50 volunteers, but she had no way of knowing if 5 or 45 of them actually opened and read it. When something went wrong, she couldn&#8217;t demonstrate that volunteers had been properly informed. She was exposed, and she knew it.</p><h2>Finding a Better Way</h2><p>Maria started researching procedure management solutions with a clear list of requirements. She needed a system that could handle the full lifecycle of a procedure&#8212;from initial draft through approval, distribution, and eventual retirement. She needed rock-solid version control that would automatically track every change and maintain a complete history. She needed granular distribution controls so procedures only went to the volunteers who needed them. And she needed attestations: a way for volunteers to formally acknowledge that they&#8217;d read and understood each procedure.</p><p>What she found surprised her. Most document management tools solved one or two of these problems but not all of them. Standard cloud storage platforms offered version history but no approval workflows or attestation tracking. Email could distribute documents but created no record of who actually read them. Enterprise compliance platforms had all the features but were priced for Fortune 500 companies and designed for full-time employees, not volunteer workforces.</p><p>She eventually found a purpose-built procedure management platform that addressed each of her pain points directly. The system maintained a complete version history automatically&#8212;no more filename gymnastics. When she updated a procedure, the system incremented the version number, logged what changed, and preserved the previous version for reference. If she ever needed to see what the herbicide application procedure said six months ago, that information was two clicks away.</p><p>The approval workflow meant procedures moved through a defined pipeline: draft, review, published. Nothing went out to volunteers until it was formally reviewed, and the system maintained a record of who approved what and when.</p><p>Distribution became targeted and automatic. Maria could assign procedures to specific volunteer groups, and when she updated a procedure, only the relevant volunteers received notifications. The wildlife monitoring team got their updates; the education ambassadors got theirs. No more blast emails to the entire volunteer list with instructions to &#8220;ignore if this doesn&#8217;t apply to you.&#8221;</p><p>Most importantly, the attestation feature gave Maria something she&#8217;d never had before: proof. When volunteers received a procedure notification, they were asked to confirm they&#8217;d read and understood the content. The system tracked who had attested and who hadn&#8217;t, with timestamps and a complete audit trail. Maria could finally answer the question &#8220;did everyone on the wetland restoration team read the updated safety protocol?&#8221; with certainty instead of hope.</p><h2>The Transformation</h2><p>Six months after implementing her new procedure management system, Maria&#8217;s world looked different. She&#8217;d consolidated all 1,000 procedures into a single, organized platform. Each volunteer group had access to exactly the procedures they needed&#8212;no more, no less. When regulations changed or best practices evolved, she could update a procedure and have confidence that the right people would be notified and that she&#8217;d have a record of their acknowledgment.</p><p>The board stopped asking nervous questions about liability exposure. New volunteer onboarding became smoother because procedures were easy to find and clearly organized. Program managers could see at a glance which of their volunteers had completed required procedure reviews and which needed reminders.</p><p>Maria still managed 500 volunteers across 40 programs. The complexity hadn&#8217;t gone away. But the chaos had. And that made all the difference.</p><div><hr></div><p><em>PolicyCo.io helps organizations like Maria&#8217;s manage procedures from creation through attestation. If you&#8217;re ready to bring order to your procedure chaos, we&#8217;d love to <a href="https://policyco.io/?utm_source=substack&amp;utm_medium=blog&amp;utm_content=procedure-distribution">show you how</a>.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.policyco.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading PolicyCo&#8217;s Newsletter! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Finding Your SOC 2 Starting Line: A Scoping Story]]></title><description><![CDATA[How a 10-person e-waste startup approached their first SOC 2 Type II audit without breaking the bank]]></description><link>https://blog.policyco.io/p/finding-your-soc-2-starting-line</link><guid isPermaLink="false">https://blog.policyco.io/p/finding-your-soc-2-starting-line</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Mon, 05 Jan 2026 03:22:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3yE5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3yE5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3yE5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!3yE5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!3yE5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!3yE5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3yE5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:6100833,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.policyco.io/i/182944755?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3yE5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 424w, https://substackcdn.com/image/fetch/$s_!3yE5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 848w, https://substackcdn.com/image/fetch/$s_!3yE5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 1272w, https://substackcdn.com/image/fetch/$s_!3yE5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8fc14cf-1735-4096-8b93-e8764902e306_3168x1344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sarah drummed her fingers on her desk, staring at the email from her biggest prospect yet. TechCorp wanted to send 500 decommissioned servers to GreenCycle for secure data destruction and recycling. The contract would triple her revenue. There was just one problem.</p><p>&#8220;We&#8217;ll need to see your SOC 2 Type II report before we can proceed.&#8221;</p><p>GreenCycle had been in business for 18 months. Ten employees. No board of directors. No compliance officer. Just Sarah (CEO), two logistics coordinators, four technicians who handled the actual e-waste processing, two sales reps, and an accountant who came in twice a month.</p><p>Sarah had heard about SOC 2, but always figured it was something for &#8220;later&#8221; &#8212; when they were bigger, more established, had a real office instead of a warehouse with a corner desk area. But TechCorp wasn&#8217;t the first client to ask. If GreenCycle wanted to move beyond small business clients and tap into enterprise contracts, SOC 2 wasn&#8217;t optional anymore.</p><p>The question was: where do you even start?</p><h2>The Scoping Conversation That Changed Everything</h2><p>Sarah called her friend Marcus, who ran a small security consultancy. &#8220;I need SOC 2,&#8221; she told him. &#8220;But I keep reading about these massive implementation projects, governance committees, and hundreds of controls. We&#8217;re ten people, Marcus. We don&#8217;t have a board. We don&#8217;t even have an HR department.&#8221;</p><p>Marcus laughed. &#8220;Sarah, you don&#8217;t need to boil the ocean here. You need to scope your audit to what actually matters for your business. Let me ask you something: what does GreenCycle actually <em>do</em> with client data?&#8221;</p><p>&#8220;We track what comes in &#8212; asset tags, serial numbers, client information. We document the destruction process. We provide certificates of destruction. Everything&#8217;s in our system.&#8221;</p><p>&#8220;Okay. And where does that happen?&#8221;</p><p>&#8220;Our warehouse in Oakland. We have a small office area, but most work happens on the floor &#8212; receiving, processing, documenting.&#8221;</p><p>&#8220;Any remote work?&#8221;</p><p>&#8220;Sales team works from home. I work from everywhere. The accountant is remote.&#8221;</p><p>&#8220;Cloud services?&#8221;</p><p>&#8220;We use Google Workspace. Our tracking system runs on AWS. We use Stripe for payments. That&#8217;s pretty much it.&#8221;</p><p>Marcus pulled out a notepad. &#8220;This is your scope, Sarah. This is what you&#8217;re actually protecting for your clients, and this is what an auditor needs to examine. Everything else? Out of scope for now.&#8221;</p><h2>Mapping GreenCycle&#8217;s SOC 2 Scope</h2><p>Over the next hour, Marcus helped Sarah map out what would actually be included in GreenCycle&#8217;s first SOC 2 Type II audit:</p><p><strong>In Scope:</strong></p><ul><li><p><strong>The Service</strong>: Client data intake, tracking, secure destruction, and certificate generation</p></li><li><p><strong>The System</strong>: Their custom tracking platform (hosted on AWS), Google Workspace, and Stripe</p></li><li><p><strong>The People</strong>: All ten employees who touch client data or the systems that process it</p></li><li><p><strong>The Locations</strong>: The Oakland warehouse and remote work locations for sales team</p></li><li><p><strong>The Data Flow</strong>: From client submission through tracking, processing, documentation, and certificate delivery</p></li></ul><p><strong>Explicitly Out of Scope:</strong></p><ul><li><p>Physical security of the warehouse (beyond basic controls for the office area where computers were kept)</p></li><li><p>E-waste recycling processes themselves (that was a different certification)</p></li><li><p>Financial systems beyond what was needed for audit logging (the accountant&#8217;s QuickBooks setup wasn&#8217;t handling client data)</p></li><li><p>Future plans for a customer portal (didn&#8217;t exist yet)</p></li></ul><p>&#8220;But wait,&#8221; Sarah interrupted. &#8220;Doesn&#8217;t SOC 2 require a board of directors? Doesn&#8217;t it require separate security and compliance teams?&#8221;</p><p>&#8220;No,&#8221; Marcus said firmly. &#8220;SOC 2 requires effective controls. It doesn&#8217;t prescribe your organizational structure. You&#8217;re small. That&#8217;s fine. What matters is that you can demonstrate you&#8217;re doing the right things consistently.&#8221;</p><h2>The Baseline Control Set</h2><p>Marcus helped Sarah understand that for a company GreenCycle&#8217;s size, pursuing Trust Services Criteria with a focused scope, they could start with a manageable set of controls:</p><p><strong>Security (required for all SOC 2 audits):</strong></p><ul><li><p>Access controls for their tracking system and Google Workspace</p></li><li><p>Password policies and multi-factor authentication</p></li><li><p>System monitoring and logging</p></li><li><p>Regular security updates</p></li><li><p>Vendor security assessments for AWS and Stripe</p></li><li><p>Basic incident response procedures</p></li><li><p>Background checks for employees handling sensitive data</p></li></ul><p><strong>Confidentiality (relevant for GreenCycle&#8217;s service):</strong></p><ul><li><p>Non-disclosure agreements with employees</p></li><li><p>Secure data destruction procedures</p></li><li><p>Encryption for data in transit and at rest</p></li><li><p>Secure certificate delivery to clients</p></li></ul><p>Sarah noticed what was <em>missing</em> from the list: no change advisory board (they used a simple Trello board for tracking system updates), no formal risk committee (Sarah reviewed risks quarterly with her leadership team of three), no dedicated security operations center (they used AWS CloudWatch and set up basic alerts), no disaster recovery site (they had AWS backups and a documented recovery process).</p><p>&#8220;This doesn&#8217;t look like the SOC 2 requirements I&#8217;ve been reading about,&#8221; Sarah said.</p><p>&#8220;That&#8217;s because most SOC 2 content is written by enterprise consultants for enterprise companies,&#8221; Marcus explained. &#8220;The actual Trust Services Criteria are principles-based, not prescriptive. They say you need to identify risks, implement controls, and monitor effectiveness. They don&#8217;t say you need a 40-person security team to do it.&#8221;</p><h2>Making It Work Without a Board</h2><p>One thing kept nagging at Sarah: &#8220;Every policy template I&#8217;ve found references board oversight and board approval. We don&#8217;t have a board. Does that kill this whole thing?&#8221;</p><p>&#8220;Not at all,&#8221; Marcus assured her. &#8220;You need governance and oversight, but it doesn&#8217;t have to be a formal board. Who owns the company?&#8221;</p><p>&#8220;I do, completely. I&#8217;m the founder and sole owner.&#8221;</p><p>&#8220;Perfect. You&#8217;re the ultimate authority. You can act as the governing body. Your policies will say something like &#8216;The CEO, acting as the governing authority for GreenCycle, reviews and approves all information security policies annually.&#8217; You&#8217;ll document those reviews. You&#8217;ll show the auditor that you&#8217;re making informed decisions about risk and controls.&#8221;</p><p>Sarah felt the weight lift a bit. &#8220;So I just... approve things?&#8221;</p><p>&#8220;You <em>govern</em> things,&#8221; Marcus corrected. &#8220;You make informed decisions about what risks to accept, what controls to implement, and how to allocate resources. You document those decisions. You review them periodically. That&#8217;s governance. A board of directors would do the same thing &#8212; you&#8217;re just doing it as the CEO because you <em>are</em> the highest authority in the company.&#8221;</p><p>For management review meetings, Sarah would involve her three key people: the Operations Manager (who oversaw the warehouse), the IT contractor who managed their systems, and the Sales Director. Together, they&#8217;d review:</p><ul><li><p>Security incidents and near-misses</p></li><li><p>Access reviews (who had access to what)</p></li><li><p>Vendor assessments</p></li><li><p>Policy effectiveness</p></li><li><p>New risks from business changes</p></li></ul><p>&#8220;Document those meetings,&#8221; Marcus advised. &#8220;Take notes. Track action items. That&#8217;s your evidence that you&#8217;re actively managing your security program.&#8221;</p><h2>The Six-Month Journey</h2><p>Marcus laid out a realistic timeline for GreenCycle&#8217;s first SOC 2 Type II:</p><p><strong>Months 1-2: Foundation and Documentation</strong></p><ul><li><p>Finalize scope with the chosen auditor</p></li><li><p>Document policies (information security, acceptable use, access control, data classification, incident response)</p></li><li><p>Implement any missing technical controls</p></li><li><p>Set up evidence collection processes</p></li></ul><p><strong>Months 3-8: The Observation Period</strong></p><ul><li><p>Live with the controls for six months (minimum for Type II)</p></li><li><p>Collect evidence continuously</p></li><li><p>Conduct monthly access reviews</p></li><li><p>Hold quarterly management reviews</p></li><li><p>Document any incidents or exceptions</p></li></ul><p><strong>Months 9-10: Audit</strong></p><ul><li><p>Auditor testing and fieldwork</p></li><li><p>Respond to auditor questions</p></li><li><p>Remediate any findings</p></li><li><p>Receive the SOC 2 report</p></li></ul><p>&#8220;Ten months total,&#8221; Sarah said. &#8220;That&#8217;s actually doable.&#8221;</p><p>&#8220;It&#8217;s doable because you&#8217;re being realistic about scope,&#8221; Marcus emphasized. &#8220;You&#8217;re not trying to implement every control in the NIST Cybersecurity Framework. You&#8217;re implementing the controls that make sense for protecting client data in your specific business model.&#8221;</p><h2>What &#8220;Light Scoping&#8221; Really Means</h2><p>As Sarah worked through the scoping process, she realized &#8220;light scoping&#8221; didn&#8217;t mean &#8220;weak security.&#8221; It meant:</p><p><strong>Focus on what matters</strong>: Client data protection for e-waste services, not every possible security control that could theoretically apply</p><p><strong>Right-size your controls</strong>: Multi-factor authentication and password policies instead of enterprise single sign-on and privileged access management systems</p><p><strong>Document what you actually do</strong>: Their weekly team huddles where they discussed any security issues became &#8220;management security review meetings&#8221; once they started taking proper notes</p><p><strong>Scale appropriately</strong>: Their three-person leadership team reviewing quarterly risks was just as effective as a large company&#8217;s formal risk committee &#8212; it was just smaller</p><p><strong>Be honest about limitations</strong>: GreenCycle&#8217;s SOC 2 report would include a clear description of what was in scope. Clients would know exactly what was being attested to.</p><h2>The Payoff</h2><p>Eight months later, Sarah received GreenCycle&#8217;s first SOC 2 Type II report. Clean opinion. No exceptions.</p><p>More importantly: she understood her own security program. The scoping process had forced her to think clearly about what GreenCycle was promising clients, what systems delivered on those promises, and what could go wrong. The controls weren&#8217;t busywork &#8212; they were genuine protections that made the business more reliable.</p><p>The TechCorp deal closed. Then three more enterprise contracts followed in the next quarter.</p><p>&#8220;Best part?&#8221; Sarah told Marcus over coffee. &#8220;We&#8217;re not scrambling. When larger clients ask about our security program now, I can actually explain it. When they ask about our board oversight, I explain our governance structure and they get it. When they want to know about our scope, I can articulate exactly what we protect and how.&#8221;</p><p>&#8220;That&#8217;s what good scoping does,&#8221; Marcus said. &#8220;It gives you clarity. Not just for the auditor, but for your business.&#8221;</p><h2>Lessons for Your First SOC 2 Scope</h2><p>If you&#8217;re approaching SOC 2 from a similar position &#8212; small team, no formal board, limited budget &#8212; here&#8217;s what GreenCycle&#8217;s experience teaches:</p><p><strong>Start with your service</strong>: What are you actually promising clients? What data are you handling? What systems deliver your service? That&#8217;s your scope.</p><p><strong>Don&#8217;t scope for the company you want to be</strong>: Scope for the company you are today. You can expand scope in future audits as you grow.</p><p><strong>Governance doesn&#8217;t require a board</strong>: It requires informed decision-making and documented oversight. A CEO can provide both.</p><p><strong>Use your size as an advantage</strong>: Smaller teams can often implement controls more quickly and consistently than large, siloed organizations.</p><p><strong>Be explicit about boundaries</strong>: Clearly document what&#8217;s in scope and what&#8217;s not. This protects you and sets accurate expectations for clients.</p><p><strong>Your first audit is about learning</strong>: Yes, you need the report for clients. But the real value is understanding your own security posture and building controls that scale.</p><div><hr></div><p><strong>Ready to scope your first SOC 2 audit?</strong> PolicyCo&#8217;s platform helps organizations of any size document their scope, map controls to Trust Services Criteria, and maintain the evidence auditors need &#8212; without enterprise complexity. <a href="https://policyco.io/schedule?utm_source=substack&amp;utm_medium=blog">Schedule some time</a> with us to see how policy lifecycle management can support your compliance journey from day one.</p>]]></content:encoded></item><item><title><![CDATA[Features and Bug Fixes]]></title><description><![CDATA[February 2025]]></description><link>https://blog.policyco.io/p/features-and-bug-fixes</link><guid isPermaLink="false">https://blog.policyco.io/p/features-and-bug-fixes</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Tue, 11 Feb 2025 21:45:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f43078e8-28d5-4153-8efa-04bee01cd241_2322x1600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wtlh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wtlh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Wtlh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Wtlh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Wtlh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wtlh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg" width="1456" height="1003" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1003,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:292924,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wtlh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Wtlh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Wtlh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Wtlh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48f1758c-894d-450b-9836-e600a2fc6ba3_2322x1600.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;ve been working hard to improve the PolicyCo platform. Here&#8217;s a list of features added and bugs squashed.</p><h1>Features Added</h1><h2>Document Import</h2><p>We&#8217;ve made it a lot easier to bring your word documents into PolicyCo. Before this upgrade, it was a pretty tedious process to bring in complete policies. Now, we have a way for you to upload your word document and let you set breaks for each article. You need a basic understanding of the Markdown text language, which we can walk you through one on one.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.policyco.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading PolicyCo&#8217;s Newsletter! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Multi Period Downloads</h2><p>When you need to download gathered evidence over a range of periods (think 12 months of a year), it&#8217;s now just a few clicks in platform.</p><h2>Archive / Unarchive Procedures</h2><p>Sometimes you don&#8217;t need that procedure anymore. Now you can archive it with peace of mind knowing that you can come back to it at a later date and bring it back to life.</p><h2>Table Width </h2><p>Reproducing tables used to be a problem, but now we are more accurately setting the width of tables between the editor view and the PDF/Word exports.</p><h2>ChatGPT</h2><p>We&#8217;ve upgraded our platform to the latest ChatGPT model to help you converse with our platform in a natural way. This is a great way to obtain natural responses to Vendor / Third Party Assessments.</p><h2>Action Plans</h2><p>Sometimes a full blown action plan isn&#8217;t necessary to remediate failed evidence collection. You can now cancel an action plan if it&#8217;s not necessary.</p><h2>Table of Contents and Cover Pages</h2><p>Set your preference at the organization level to include or exclude, while still keeping the ability to override that setting at download.</p><h2>Edit Review Cycle</h2><p>Change the review cycle and the reviewer without altering the policy. Thanks to our clients for bringing this to our attention.</p><h2>Bypass Period</h2><p>Sometimes you need to bypass a period when gathering evidence. Think of this as an Action Plan light.</p><h1>Bugs Squashed</h1><ul><li><p>Improve response of audit log listing</p></li><li><p>Attestations not showing correctly in some edge cases on the viewer</p></li><li><p>Attestations categories improved (removed &#8216;superseded&#8217; language)</p></li><li><p>Some procedure downloads failing</p></li><li><p>Improve keyword search across policies and procedures</p></li><li><p>Provide ability to copy redline text for candidates</p></li><li><p>Table rendering fixes</p></li><li><p>Document share fixes</p></li><li><p>Bulk author updates fixed</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.policyco.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading PolicyCo&#8217;s Newsletter! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Importance of Attestations in Governance and Accountability]]></title><description><![CDATA[Introduction]]></description><link>https://blog.policyco.io/p/the-importance-of-attestations-in</link><guid isPermaLink="false">https://blog.policyco.io/p/the-importance-of-attestations-in</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Mon, 17 Apr 2023 19:56:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xTFX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xTFX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xTFX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 424w, https://substackcdn.com/image/fetch/$s_!xTFX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 848w, https://substackcdn.com/image/fetch/$s_!xTFX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 1272w, https://substackcdn.com/image/fetch/$s_!xTFX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xTFX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512" width="512" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:512,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xTFX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 424w, https://substackcdn.com/image/fetch/$s_!xTFX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 848w, https://substackcdn.com/image/fetch/$s_!xTFX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 1272w, https://substackcdn.com/image/fetch/$s_!xTFX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfceb82a-692a-4c07-99bd-e48dac3e1c77_512x512 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"></figcaption></figure></div><h1>Introduction</h1><p>In today's fast-paced business world, organizations must ensure that their employees are aware of and adhere to company policies and procedures. This is where attestations come into play. Attestations are an essential part of the governance process, as they provide a means for organizations to capture signatures from their team members, demonstrating that policies have been acknowledged and understood. In this article, we will discuss the importance of attestations in governance and accountability, with a focus on legal responsibility and the role they play in ensuring that employees are aware of company standards related to their work behavior.</p><h1>The Role of Attestations in Governance</h1><p>Governance refers to the system of rules, practices, and processes by which an organization is directed and controlled. It involves balancing the interests of various stakeholders, such as shareholders, management, customers, suppliers, financiers, government, and the community. Attestations play a crucial role in governance by providing a formal mechanism for employees to acknowledge their understanding of and commitment to company policies and procedures.</p><p>One of the primary objectives of governance is to ensure that organizations operate within the confines of the law and adhere to established ethical standards. Attestations help achieve this goal by creating a clear audit trail that demonstrates employees' awareness of and compliance with company policies. This not only helps organizations maintain a strong legal standing but also fosters a culture of accountability and transparency.</p><h1>Legal Responsibility and Attestations</h1><p>From a legal standpoint, attestations serve as evidence that employees have been informed of their responsibilities and the company's expectations regarding their work behavior. This is particularly important when it comes to policies that have legal implications, such as those related to data privacy, workplace safety, and anti-discrimination.</p><p>For example, ensuring that employees have signed an acceptable use policy (AUP) is crucial for organizations that handle sensitive data or operate in highly regulated industries. An AUP outlines the acceptable use of company resources, including computer systems, networks, and electronic devices, and helps protect the organization from potential legal liabilities arising from unauthorized or inappropriate use of these resources. By obtaining employee attestations for the AUP, organizations can demonstrate that they have taken the necessary steps to inform employees of their responsibilities and expectations, thereby reducing the risk of legal issues and potential penalties.</p><p>Similarly, attestations can play a critical role in demonstrating compliance with workplace safety regulations. By obtaining employee signatures on safety policies and procedures, organizations can show that they have made a concerted effort to educate their workforce on safe work practices and have taken the necessary steps to minimize the risk of accidents and injuries.</p><h1>Attestations and Accountability</h1><p>In addition to their legal benefits, attestations also promote a culture of accountability within an organization. When employees sign off on company policies, they are effectively acknowledging their understanding of the rules and their commitment to abide by them. This not only helps to ensure that employees are aware of their responsibilities but also fosters a sense of ownership and personal accountability for their actions.</p><p>Moreover, attestations can serve as a valuable tool for management to gauge employee engagement and identify potential areas of concern. For instance, if a significant number of employees have not signed off on a particular policy, this may indicate a lack of understanding or awareness, signaling the need for additional training or communication efforts.</p><h1>Implementing an Effective Attestation Process</h1><p>To fully realize the benefits of attestations in governance and accountability, organizations must implement an effective attestation process. This includes:</p><p>1. Establishing clear and comprehensive policies: Organizations must develop well-defined policies that outline employee responsibilities and expectations. These policies should be easily accessible and written in a language that employees can understand.</p><p>2. Communicating policies to employees: It is essential to ensure that employees are aware of company policies and understand their implications. This may involve conducting training sessions, distributing policy documents, or using digital platforms to disseminate information.</p><p>3. Obtaining employee attestations: Organizations should establish a formal process for obtaining employee signatures on policy documents. This may involve using digital tools, such as electronic signature platforms, to streamline the process and maintain a secure audit trail.</p><p>4. Monitoring and enforcing compliance: Management must regularly review employee attestations to identify potential areas of concern and take appropriate action to address any issues. This may involve conducting audits, providing additional training, or implementing disciplinary measures for non-compliance.</p><p>5. Continuously updating and improving policies: Organizations must regularly review and update their policies to ensure that they remain relevant and effective. This may involve soliciting employee feedback, monitoring industry trends, and staying abreast of changes in laws and regulations.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://policyco.io/schedule&quot;,&quot;text&quot;:&quot;Learn more...&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://policyco.io/schedule"><span>Learn more...</span></a></p><p></p><h1>Conclusion</h1><p>Attestations are a vital component of the governance process, serving as a means to demonstrate legal compliance and promote a culture of accountability within an organization. By implementing an effective attestation process, organizations can not only protect themselves from potential legal liabilities but also foster a transparent and responsible work environment that benefits all stakeholders.</p><p>We recently released our <a href="https://support.policyco.io/en/articles/7216505-attestations">attestations module</a>.</p>]]></content:encoded></item><item><title><![CDATA[Homogenize the Enterprise]]></title><description><![CDATA[It&#8217;s almost impossible to calculate the time individuals spend ensuring policy consistency across an organization.]]></description><link>https://blog.policyco.io/p/homogenize-the-enterprise-491f13c80cd2</link><guid isPermaLink="false">https://blog.policyco.io/p/homogenize-the-enterprise-491f13c80cd2</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Tue, 29 Nov 2022 18:58:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4fHh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4fHh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4fHh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 424w, https://substackcdn.com/image/fetch/$s_!4fHh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 848w, https://substackcdn.com/image/fetch/$s_!4fHh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 1272w, https://substackcdn.com/image/fetch/$s_!4fHh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4fHh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!4fHh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 424w, https://substackcdn.com/image/fetch/$s_!4fHh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 848w, https://substackcdn.com/image/fetch/$s_!4fHh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 1272w, https://substackcdn.com/image/fetch/$s_!4fHh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F545ddda9-a50f-4d76-9196-7431b690fa8c_1024x682.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>It&#8217;s almost impossible to calculate the time individuals spend ensuring policy consistency across an organization. We painstakingly attempt to follow style guides to underscore brand uniqueness. Templates for decks, docs and spreadsheets help, but they are limited because content creators can override template&nbsp;styles.</p><p>When writing policy and procedures, content is king. Policies and procedures demand consistency. Font face, size, styles, sections, titles, table of contents, headers, footers, and numbered lists need to be the same across all documents.</p><p>Even for a small organization with dozens of policies, maintaining consistency requires dedicated clerical intervention with a critical eye. Even a very small change like adding an underline to every H2, requires opening every policy to make the style change. Imagine combing through scores of policies to ensure numbered points are setup as 1.(A)(i) instead of 1.2.3. The problem is compounded with large organizations.</p><p>PolicyCo documents inherit styles from a single source of truth set at the organization level. All styles are set from one place for all documents. Practically, this means your team can write content without the distraction of setting styles. Additionally, you gain the flexibility to change your mind by changing styles for the organization, <em><strong>updating every policy at once</strong></em>. Coupling this with our article-first approach to building policy, the table of contents is also constructed based on your established hierarchy.</p><p>Also, our <em><strong>document classification</strong></em> feature has the capability to add custom headers and footers to different document classifications in minutes rather than&nbsp;hours.</p><p>We recognize that maintaining policy is different from creating word documents and we developed a platform that specifically caters to the needs of policy writers. Don&#8217;t estimate the hidden costs of busywork. If you&#8217;d like to learn more visit us at <a href="https://policyco.io/workflow">PolicyCo.io</a>.</p><div><hr></div><p><a href="https://blog.policyco.io/homogenize-the-enterprise-491f13c80cd2">Homogenize the Enterprise</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[Cooperative Compliance Across the Enterprise]]></title><description><![CDATA[Maintaining your compliance posture is hard work.]]></description><link>https://blog.policyco.io/p/cooperative-compliance-across-the-enterprise-5975a3e9db15</link><guid isPermaLink="false">https://blog.policyco.io/p/cooperative-compliance-across-the-enterprise-5975a3e9db15</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Wed, 28 Sep 2022 04:37:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!H-QS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H-QS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H-QS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 424w, https://substackcdn.com/image/fetch/$s_!H-QS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 848w, https://substackcdn.com/image/fetch/$s_!H-QS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 1272w, https://substackcdn.com/image/fetch/$s_!H-QS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H-QS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/cc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A department collaborating on a procedure tied to policy.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A department collaborating on a procedure tied to policy." title="A department collaborating on a procedure tied to policy." srcset="https://substackcdn.com/image/fetch/$s_!H-QS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 424w, https://substackcdn.com/image/fetch/$s_!H-QS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 848w, https://substackcdn.com/image/fetch/$s_!H-QS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 1272w, https://substackcdn.com/image/fetch/$s_!H-QS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc7889e5-128f-4e2a-9b8f-a8aafd0a6953_1024x687.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Keep procedures in sync with&nbsp;policy.</figcaption></figure></div><p>Maintaining your compliance posture is hard work. There are many personalities and competing interests. Business Development wants to grow. Operations needs to be nimble. Product wants to innovate and be reliable. Legal strives to stay out of trouble. Leadership needs to manage the big picture. These competing interests naturally create silos of information.</p><p>One of the greatest challenges to a compliance program is mining these silos and associating them in some meaningful way to policy. Further complicating this, we recognize that the information and activity in each silo is dynamic often changing on a daily or weekly basis. Some examples&nbsp;include:</p><ul><li><p>Onboarding and offboarding procedures</p></li><li><p>Data architecture diagrams</p></li><li><p>Customer service procedures</p></li><li><p>Devops procedures</p></li><li><p>IT procedures and support&nbsp;guides</p></li><li><p>Purchasing and finance guidelines</p></li></ul><p>Policies are generally managed by legal or compliance teams. It&#8217;s not uncommon to see outdated procedures tied to policy to keep up with changes to each&nbsp;silo.</p><h3>Modern Problems Require Modern Solutions</h3><p>Departments need autonomy when writing procedures, runbooks and process manuals. Managers often use Word or Google Docs and distribute them via email or from a shared drive. Technical teams may opt for Confluence, Github (via readme.md) or Dropbox. These are all great solutions and should continue to be used, but they need some sort of <strong>glue</strong> to hold them together to ensure your <strong>policies</strong> have procedural coverage.</p><p>PolicyCo addresses this need by giving your departments independent access to write and share procedures. Department members are able to write procedures and submit them for approval to their manager. Managers can grant access to the department or extend access to the organization.</p><blockquote><p>&#8220;Finally, the compliance team can stop chasing down outdated procedures. This means less work for everyone.&#8221;</p></blockquote><p>Compliance needs to make sure procedures are current. Once a procedure is created, compliance can link it directly to policy. Now, procedures are maintained <strong>in real time</strong> by departments while legal/compliance benefits by eliminating the upkeep. It&#8217;s a win-win for the enterprise.</p><p>Policy can be exported <em>with</em> or <em>without</em> procedures attached, depending on the specific need. Further, employees can browse or search procedures with a lightweight mobile-friendly viewer improving knowledge transfer across the organization.</p><h3>The Champion</h3><p>Stop fighting the silos and embrace your various systems by recording where procedural source of truth&nbsp;lives.</p><p>It takes an operational mindset to address growing inefficiency in an organization. If you are the champion for your organization and are interested in solving this problem, we&#8217;d love to&nbsp;<a href="https://policyco.io">talk</a>.</p><div><hr></div><p><a href="https://blog.policyco.io/cooperative-compliance-across-the-enterprise-5975a3e9db15">Cooperative Compliance Across the Enterprise</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[How Do Management Action Plans Lead to Organizational Excellence?]]></title><description><![CDATA[Your organization is an ecosystem of interworking parts; a vast collection of automated and manual agents, ideally pointed in a direction with the intent of improving your chances for success or optimizing market value.]]></description><link>https://blog.policyco.io/p/how-do-management-access-plans-lead-to-organizational-excellence-664832ff70b0</link><guid isPermaLink="false">https://blog.policyco.io/p/how-do-management-access-plans-lead-to-organizational-excellence-664832ff70b0</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Thu, 28 Jul 2022 15:21:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xwLL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xwLL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xwLL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 424w, https://substackcdn.com/image/fetch/$s_!xwLL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 848w, https://substackcdn.com/image/fetch/$s_!xwLL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 1272w, https://substackcdn.com/image/fetch/$s_!xwLL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xwLL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xwLL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 424w, https://substackcdn.com/image/fetch/$s_!xwLL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 848w, https://substackcdn.com/image/fetch/$s_!xwLL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 1272w, https://substackcdn.com/image/fetch/$s_!xwLL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1d0e114b-f9e2-4445-9fa7-a3bee60d93e6_1024x573.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Your organization is an ecosystem of interworking parts; a vast collection of automated and manual agents, ideally pointed in a direction with the intent of improving your chances for success or optimizing market value. Healthy organizations spend an immense amount of time documenting their inner workings though training both verbal and written. But how do we determine if your activities are contributing to positive&nbsp;change?</p><p>Obviously, policy plays an important role. SOC2 addresses many of the key points required to operationalize your workflow. It codifies board involvement, hiring, operational flow and security just to name a few. Even with all its strengths, an organization cannot realize the full benefit without oversight.</p><h3>Oversight</h3><p>Mature organizations understand the benefits of meaningful oversight. The connotations of oversight range depending on one&#8217;s perspective. It&#8217;s understandable for an employee to feel mistrusted if their work is always scrutinized by a third-party. As a leader, it&#8217;s important to focus on organization excellence and how oversight can unearth meaningful data to inform decisions leading to better outcomes.</p><p>At this point, it&#8217;s important to visualize an example of oversight applicable to your organization. Let&#8217;s assume that your organization conducts background checks on individuals and maintains standards related to the results of those investigations. We can break this down and follow the path through, control, policy, procedure and evidence.</p><ul><li><p><strong>Control. </strong>SOC2 CC1.4.2 contains relevant language related to an employee&#8217;s background. While this control isn&#8217;t completely prescriptive, it makes that point that you, as an organization, make every effort to hire individuals who have the skills needed to perform their intended job function.</p></li><li><p><strong>Policy.</strong> If we look to your Workforce Onboarding and Clearance policy, we are likely to find an article related to the Scope of Background Investigations. This article must state the organizational requirements; in this case, that a background check must be performed, reviewed, and&nbsp;stored.</p></li><li><p><strong>Procedure.</strong> This is where the substantive language begins. The procedure outlines specific steps, vendor names, individual or roles and, properly written, allows for little to no room for interpretation.</p></li><li><p><strong>Evidence.</strong> (also known as control tests) Evidence captures procedural activity demonstrating that procedures are followed as written. Referring to our example, this might be a list of current employees cross referenced to a list of background checks. Do we have a 1&#8211;1 match? If we have standards for rejection based on the background check findings, did we follow those standards?</p></li></ul><blockquote><p>The steps above are all critical to your compliance effort, but getting to finish line requires several more important steps.</p></blockquote><h3>Accountability</h3><p>Let&#8217;s focus on the last step, evidence. I&#8217;m going to make a case here for the importance of separation of duties for automated and manual evidence gathering. It&#8217;s great when we use API&#8217;s to automate gathering routine evidence month after month. For information we cannot gather automatically, we must gather manually.</p><p><strong>Automation breaks.</strong> Who holds accountable the programmer responsible for the script when it stops functioning as expected or when the returned data is not longer relevant?</p><p><strong>Manual processes become outdated.</strong> Who reviews manual evidence and compares it to the procedural language to ensure that it satisfies the spirit of the connected procedures, policy and controls?</p><p>The answer to both questions points to an independent review process. This means that the person or process gathering evidence <strong>must not</strong> also bear the responsibly for verifying accuracy. This distinction lays the groundwork for how <strong>Management Action Plans </strong>can transform your organization.</p><h3>Self Improvement</h3><p>Athletes don&#8217;t excel by being complacent. It&#8217;s a daily routine of self critique, analysis, and a will to improve. Organizations are no different. Oversight highlights weak processes by shedding light on procedural shortfalls, but awareness is only the first step. Next, we must devise a plan to remediate.</p><p>Management Action Plans do exactly this. They set into motion a chain of custody between the reviewer and the procedural stakeholder ensuring that steps will be taken according to mutually agreed upon timelines, to resolve failed control&nbsp;tests.</p><p>Let&#8217;s look at our previous example to see how a Management Action Plan might be used to resolve a failed control&nbsp;test.</p><ul><li><p>Assignee submits the results of employee background checks&nbsp;monthly.</p></li><li><p>Reviewer views each background check and finds that there are 3 employees on the new hire list without a background check on&nbsp;file.</p></li><li><p>Reviewer fails the period and sets in motion a Management Action Plan. At this stage, the reviewer (1) crafts a narrative explaining the nature of the failure; (2) assigns a plan Author with the necessary skills to write the plan and; (3) sets a due date for the written plan. <em>&#8220;I&#8217;m seeing 3 employee background checks missing from February. Please explain why and how you expect to resolve this in the&nbsp;future.&#8221;</em></p></li><li><p>The Author is now required to submit their plan by the prescribed date. The Author must also provide an estimated plan completion date. This plan is not considered approved until the initial reviewer accepts the plan. <em>&#8220;We changed to a new vendor in mid February and our new vendor isn&#8217;t sending the to us. I will notify the vendor to get the missing three background checks and will ask them to setup and automated process to place these in the correct location upon completion.&#8221;</em></p></li><li><p>Once the plan is complete, the Author is again responsible for explaining the details of the completion, and this too, is subject to reviewer approval. <em>&#8220;Our new vendor was able to provide the past reports and they have agreed, and I have verified that reports are going to the correct location.&#8221;</em></p></li></ul><p>The example above represents a straightforward use case. Management Action Plans can be very complex involving months or years of planning to remediate. It&#8217;s plausible that an organization might consider modifying policy or procedures in order to accommodate limitations around evidence gathering activities.</p><p>I hope this article has helped you better understand how Management Action Plans can help you and your team think critically and use that information to continually aim for excellence. <a href="https://policyco.io/schedule">Reach out to us</a> to learn&nbsp;more.</p><div><hr></div><p><a href="https://blog.policyco.io/how-do-management-access-plans-lead-to-organizational-excellence-664832ff70b0">How Do Management Action Plans Lead to Organizational Excellence?</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[How to Survive a Compliance Incident]]></title><description><![CDATA[A well-prepared cybersecurity program can minimize threats; however, a company can never eliminate risk due to the human factor.]]></description><link>https://blog.policyco.io/p/how-to-survive-a-compliance-incident-dbd4033a377d</link><guid isPermaLink="false">https://blog.policyco.io/p/how-to-survive-a-compliance-incident-dbd4033a377d</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Tue, 12 Apr 2022 16:15:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RIBO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RIBO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RIBO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RIBO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RIBO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RIBO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RIBO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!RIBO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 424w, https://substackcdn.com/image/fetch/$s_!RIBO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 848w, https://substackcdn.com/image/fetch/$s_!RIBO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!RIBO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16308146-7d24-4f44-9806-176ee8266d9a_961x561.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>A well-prepared cybersecurity program can minimize threats; however, a company can never eliminate risk due to the human factor. For example, the <a href="https://www.cioxhealth.com/notice-of-email-security-incident/">CIOX incident</a> from July 2021 was from a single email account and yet affected thousands of individuals. Cyber threats have evolved to become more organized and sophisticated, so what happens after a large-scale incident is reported?</p><h3>Activate the Incident Response&nbsp;Plan</h3><p>The incident response plan outlines the steps and phases of what to do when a breach has occurred. It also establishes a communication channel so the organization knows who to notify in the event of a violation. A well-established plan should include performing mock sessions and reviewing the plan annually. One of the first steps in any incident response plan will consist of updating the team with as much information about the breach as possible, including:</p><ul><li><p>How was the threat discovered?</p></li><li><p>What areas does this&nbsp;impact?</p></li><li><p>Who discovered it?</p></li><li><p>When was it first&nbsp;noticed?</p></li></ul><h3>Isolation and Eradication</h3><p>During this time, the team will collect any available data from applications and interview anyone involved with the breach. The team will identify the threat and contain it to prevent further damage. Depending on the nature of the breach, this could include short-term and longer-term containment strategies. Once the team removes the threat, the team will identify the root cause to prevent similar attacks in the future (e.g., patching a system, resetting passwords, or removing malware). Depending on the nature of the episode, you may need to consider engaging with a forensic firm that can identify all areas impacted. For example, a breach of an email account could have further repercussions because a hacker could have spoofed and sent emails to other individuals gaining access to additional accounts.</p><h3>Analysis of legal requirements</h3><p>Once the team eradicates the threat, the team needs to review legal and regulatory requirements. Whether there are legal requirements is likely dependent on the type of data exposed and accessed (e.g., Did this involve PHI? Was client data accessed?). Review your contract matrix to determine the notification period and contact details. Identify what regulations you might need to follow (e.g., Do you need to report this to a government entity?). If the analysis concludes the external individuals are affected, you should seek legal counsel. Additionally, depending on the extent of the breach, you may need to notify your cyber liability insurance carrier.</p><h3>Notification</h3><p>You will need to start informing victims and relevant government entities at this stage. If the breach is extensive and includes PHI, you might be obligated to report it to the media to comply with <a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html">HIPAA regulations</a>. You may consider hiring a PR firm to orchestrate the messaging and your legal team. If you are a business associate, you should be prepared to provide enough information to the covered entity to identify all individuals impacted by the incident. Before sending notifications, prepare statements that address frequently asked questions (e.g., Why did this happen? What is the company doing to ensure this does not happen again? Who was involved?). The organization needs to identify which employees can answer questions about the breach and whether they are confidential or still under development. If multiple individuals are involved, you may want to consider setting up a call center that is prepared to answer frequently asked questions. A breach notification can also lead to an external audit. You will want to secure all evidence gathered related to the breach and ensure your policies and procedures are up to&nbsp;date.</p><h3>Lessons Learned</h3><p>The incident response team will want to regroup and minimize future threats. Determine the root cause of the breach, identify the risk to eliminate through policy changes, updates, or purchasing cyber security tools, and perform an internal audit to identify additional risks. Need assistance creating an incident response plan or organizing your policies? <a href="https://policyco.io/demo/">Contact PolicyCo</a> for&nbsp;help.</p><div><hr></div><p><a href="https://blog.policyco.io/how-to-survive-a-compliance-incident-dbd4033a377d">How to Survive a Compliance Incident</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[Navigating Multiple Control Frameworks]]></title><description><![CDATA[Policy architecture is complex, and the difficulty is compounded as your organization attempts to comply with more regulations and frameworks.]]></description><link>https://blog.policyco.io/p/navigating-multiple-control-frameworks-92393e5bb1f7</link><guid isPermaLink="false">https://blog.policyco.io/p/navigating-multiple-control-frameworks-92393e5bb1f7</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Fri, 01 Apr 2022 14:05:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Nct0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nct0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nct0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Nct0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Nct0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Nct0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nct0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Nct0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Nct0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Nct0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Nct0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F25d08b9c-9ec4-4760-82fe-bfcd8ad320f5_961x561.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Policy architecture is complex, and the difficulty is compounded as your organization attempts to comply with more regulations and frameworks. Ambiguity tends to be the culprit here. Fundamentally, we as humans like to fit things into a neat classification system. However, there is a mountain of terminology to master, and even then, we still often find that certain pieces of policy language can apply to more than one&nbsp;area.</p><p>The only reasonable way to navigate multiple control frameworks is to <strong>normalize framework concepts</strong> into your policy statements. That&#8217;s a mouthful, so let&#8217;s take a minute to break down the statement.</p><h3><strong>Normalizing Framework Concepts</strong></h3><p>A mathematician might think of this as finding the least common denominator, which is easy because there is a correct answer. In our world, it&#8217;s more complicated. We must rely on our interpretation of framework concepts to craft an appropriate policy statement. Let&#8217;s get started with a relatively straightforward example. Each of the controls listed below talks about the concept of encrypting data as it traverses a network. Some are more prescriptive, and others are more general. Note that HITRUST and CIS are very specific about the use of&nbsp;WPA2.</p><ul><li><p>HITRUST 0502.09m1Organizational.5&#8202;&#8212;&#8202;Wireless access points are configured with strong encryption (AES WPA2 at a minimum).</p></li><li><p>CIS 12.6&#8202;&#8212;&#8202;Use secure network management and communication protocols (e.g., 802.1X, Wi-Fi Protected Access 2 (WPA2) Enterprise or greater).</p></li><li><p>PCI DSS 4.1.1&#8202;&#8212;&#8202;Encrypt transmission of cardholder data across open, public&nbsp;networks</p></li><li><p>SOC2 CC6.7.2&#8202;&#8212;&#8202;Uses Encryption Technologies or Secure Communication Channels to Protect Data&#8202;&#8212;&#8202;Encryption technologies or secured communication channels protect data transmission and other communications beyond connectivity access&nbsp;points.</p></li><li><p>HIPAA 164.312(e)(2)(ii)&#8202;&#8212;&#8202;Implement a mechanism to encrypt electronically protected health information whenever deemed appropriate.</p></li></ul><p>Let&#8217;s try to craft a policy statement (we call it an article) in our Wireless Security Policy that normalizes the above language for our use. We can accomplish this by looking at the concepts above and including those concepts that are common to all in our statement. Concepts: encryption, transit, wireless. This can get tricky because several of the controls above make no mention of wireless. It&#8217;s our responsibility to understand that transmission can happen over wired or wireless networks.</p><p><strong>&#8220;Wireless access points must be configured with strong encryption. At a minimum, AES WPA 2 must be configured.&#8221;</strong></p><p>The process of normalizing policy language is compelling. It means that we can state our intentions in <strong>our</strong> vernacular while adhering to principles defined by&nbsp;others.</p><p>So if we were to take our newly crafted article and bring it into our Wireless Policy, it might look like&nbsp;this:</p><p><strong>1.3 Wireless Encryption</strong></p><p>Wireless access points must be configured with solid encryption. At a minimum, AES WPA 2 must be configured.</p><p>HITRUST 0502.09m1Organizational.5</p><p>CIS 12.6</p><p>PCI DSS&nbsp;4.1.1</p><p>SOC2 CC6.7.2</p><p>HIPAA 164.312(e)(2)(ii)</p><p>We&#8217;ve responsibly displayed the article and all applicable controls. The problem is that we wrote this in Word or Google Docs, which means these are just words on a page. There is no meaning embedded in these concepts, which means additional repetitive work for everyone. For&nbsp;example:</p><ul><li><p>We don&#8217;t know that Wireless Encryption is the third article in the&nbsp;policy</p></li><li><p>We don&#8217;t know that this article is linked to 5 different framework controls</p></li><li><p>We don&#8217;t know the meaning or definitions of these&nbsp;controls</p></li></ul><h3><strong>Procedures</strong></h3><p>Different frameworks place varying emphasis on the presence of procedures. At PolicyCo, we strongly feel that each article should be accompanied by at least one procedure; after all, the article states what you intend to do while the procedure explains how you plan to go about&nbsp;it.</p><p>The incredibly vital part of admitting that you need a procedure is knowing that you only need to write it once to satisfy all the controls mapped to the article. In our example above, the procedure for ensuring that wireless access points are encrypted is as&nbsp;follows:</p><p><strong>&#8220;Encryption is enforced through the Meraki wireless configuration dashboard at</strong> <strong><a href="https://meraki.com.">https://meraki.com.</a> The dashboard enforces WPA2 for all access points, and the IT Director is in charge of the setup and enforcement of this security setting.&#8221;</strong></p><p>This procedure, as written, states who is responsible for the execution and where to access the setting. <em>We only had to write the procedure once to satisfy Article 1.3 plus the five related controls.</em></p><h3><strong>Evidence (Control&nbsp;Testing)</strong></h3><p>In much the same way procedures benefit from being tied to a single article, Evidence (Control Testing) benefits. The only responsible way to verify that procedures are being followed is to provide evidence of the activities described in the procedure. Interestingly, by the time we arrive at the description for testing, we don&#8217;t care much about the meaning of the controls. Our only responsibility is to validate that the procedure is being followed. This test follows a logical path back to the control (Evidence: Procedure: Article: Control).</p><h3><strong>Build Relationships</strong></h3><p>It&#8217;s an excellent motto for life and policy management. The only responsible way to tame multiple control frameworks is to normalize your internal language and build these relational connections. The process takes time, and careful consideration, but the rewards come in the form of peace of mind, productivity gains, and preparedness.</p><ul><li><p>For a given control, which policies are referenced (and where is it in the&nbsp;policy)?</p></li><li><p>How many controls and frameworks are applicable for a given article within a&nbsp;policy?</p></li><li><p>Do I have control requirements without policy associations?</p></li><li><p>Am I missing procedures for some controls/articles?</p></li><li><p>Am I collecting Evidence (Control Testing) for all of my controls required?</p></li></ul><p>Those are just five questions, but we can answer dozens more by exploring the rich relationships created in the PolicyCo platform.</p><p><em>Originally published at <a href="https://policyco.io/best%20practices/2022/01/04/navigating-multiple-control-frameworks/">https://policyco.io</a> on January 4,&nbsp;2022.</em></p><div><hr></div><p><a href="https://blog.policyco.io/navigating-multiple-control-frameworks-92393e5bb1f7">Navigating Multiple Control Frameworks</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[The Ambiguity of Compliance Terms]]></title><description><![CDATA[According to Tenable, over 44% of organizations use more than one security framework.]]></description><link>https://blog.policyco.io/p/the-ambiguity-of-compliance-terms-fd9f5ee4ca87</link><guid isPermaLink="false">https://blog.policyco.io/p/the-ambiguity-of-compliance-terms-fd9f5ee4ca87</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Fri, 01 Apr 2022 14:05:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XU4y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XU4y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XU4y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XU4y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XU4y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XU4y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XU4y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/e87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!XU4y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XU4y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XU4y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XU4y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe87dc9f9-741e-4767-9135-15e3d13d14f9_961x560.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>According to <a href="https://www.tenable.com/whitepapers/trends-in-security-framework-adoption">Tenable</a>, over 44% of organizations use more than one security framework. Mapping controls from one framework to another is complex and adding to the complexity is the ambiguity of terms across the frameworks. Some frameworks have defined controls to follow, while others offer guidelines. At PolicyCo, we have created a mapping system that standardizes the terminology allowing us to easily map more than one framework to a procedure, policy, or piece of evidence. This required us to dissect the nuanced differences between the security frameworks allowing an organization to follow multiple frameworks while reducing the redundancy across an organization&#8217;s cybersecurity program. Below is the glossary of terms specific to mapping security frameworks back to the evidence, policies, and procedures.</p><h3><strong>ISO</strong></h3><ul><li><p><strong>Standards</strong>: Specifications that similar organizations can use to ensure materials, products, processes, and services meet industry best practices</p></li><li><p><strong>Clauses</strong>: Sections containing specific requirements and processes.</p></li><li><p><strong>Controls</strong>: Safeguards to reduce security&nbsp;risks</p></li></ul><h3><strong>SOC 2</strong></h3><ul><li><p><strong>Criteria</strong>: An individual specification</p></li><li><p><strong>Category</strong>: Sections containing a set of specific criteria related to an aspect of the security&nbsp;program</p></li><li><p><strong>Internal Control</strong>: An organization&#8217;s objective to protect information security</p></li></ul><h3><strong>HITRUST</strong></h3><ul><li><p><strong>Category</strong>: Section containing specifications and objectives for information security and risk management</p></li><li><p><strong>Domain</strong>: Organized sections based on standard IT organizational structure</p></li><li><p><strong>Objective</strong>: Statement of the intended&nbsp;result</p></li><li><p><strong>Specification</strong>: Policies, procedures, guidelines, practices, or organizational structures, which can be operational, technical, or&nbsp;legal</p></li><li><p><strong>Reference</strong>: An individual requirement/ control</p></li></ul><h3><strong>NIST</strong></h3><ul><li><p><strong>Function</strong>: Organized cybersecurity activities and&nbsp;outcomes</p></li><li><p><strong>Category</strong>: A subdivision of a function that contains cybersecurity objectives</p></li><li><p><strong>Subcategory</strong>: Outcome driven statements and security&nbsp;controls</p></li><li><p><strong>Informative References</strong>: Detailed technical resources used to support implementing subcategories</p></li></ul><h3><strong>PCI</strong></h3><ul><li><p><strong>Goal</strong>: Organized section of requirements that state the intended&nbsp;result</p></li><li><p><strong>Requirement</strong>: Organized sections of security protocols/controls for securing&nbsp;data</p></li><li><p><strong>Sub-requirements</strong>: The specific security control for obtaining data</p></li><li><p><strong>Compensating Control</strong>: A similar method for adhering to the requirement utilized when an entity cannot meet the requirement as expressly stated</p></li><li><p><strong>Guidance</strong>: The core purpose of the requirement and additional content to assist in the definition of the requirement</p></li></ul><h3><strong>Manage Multiple Frameworks with&nbsp;PolicyCo</strong></h3><p>Cybersecurity compliance can be overwhelming; hopefully, we&#8217;ve cleared up some confusion on the language used by some of the most popular frameworks. If you are struggling with managing multiple cybersecurity frameworks, PolicyCo can help. Our platform streamlines compliance processes across frameworks for organizations, and our vCISO team has extensive experience developing cohesive policy language from a variety of framework controls. Contact us for more information.</p><p><em>Originally published at <a href="https://policyco.io/best%20practices/2021/12/14/the-ambiguity-of-compliance-terms/">https://policyco.io</a> on December 14,&nbsp;2021.</em></p><div><hr></div><p><a href="https://blog.policyco.io/the-ambiguity-of-compliance-terms-fd9f5ee4ca87">The Ambiguity of Compliance Terms</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[Employee Handbooks and Your Small Business]]></title><description><![CDATA[Writing and reading employee handbooks can be tedious, so it isn&#8217;t surprising that many small businesses skip over them entirely.]]></description><link>https://blog.policyco.io/p/employee-handbooks-and-your-small-business-52ca412ea113</link><guid isPermaLink="false">https://blog.policyco.io/p/employee-handbooks-and-your-small-business-52ca412ea113</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Fri, 01 Apr 2022 14:03:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!W86e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!W86e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W86e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 424w, https://substackcdn.com/image/fetch/$s_!W86e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 848w, https://substackcdn.com/image/fetch/$s_!W86e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!W86e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W86e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!W86e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 424w, https://substackcdn.com/image/fetch/$s_!W86e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 848w, https://substackcdn.com/image/fetch/$s_!W86e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!W86e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1c0e539e-5d5e-4559-9bd5-603a43850b31_597x336.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Writing and reading employee handbooks can be tedious, so it isn&#8217;t surprising that many small businesses skip over them entirely. When your team is small, it may seem easier to talk about ideas, policies, and procedures as they come up in an ad-hoc&nbsp;way.</p><p>However, employee handbooks are useful for many reasons. Avoiding working on one because it&#8217;s not fun can cause you pain and strife down the road, including high staff turnover or even lawsuits. Effective handbooks clearly state expectations between the employer and employee. When everyone is on the same page, there are fewer risks to the employee, the employer, and the business as a whole. As a small business owner, to have a basic boilerplate employee manual. It needs to be both useful and engaging. If it doesn&#8217;t meet those two criteria, it&#8217;s probably not going to get read. It&#8217;s not going to do you any good if it just sits on a shelf collecting dust.</p><p>The basic purpose of an employee manual is to get everyone on the same page when it comes to expectations. Employees need to understand what their role is within the business and how they&#8217;re expected to reflect the values of the brand. When expectations are clearly stated upfront, you will be better able to recruit quality employees and prevent high turnover. In an increasingly millennial workforce, this is crucial. According to a study from Gallup, 21% of millennials say that they have changed jobs within the past year. That number is three times higher than non-millennials. Preventing turnover is essential today. It&#8217;s important that you only include the information that your employee absolutely needs. Employees will be much more likely to read through an entire employee manual if it is focused and relevant to their position. For instance, Nordstrom&#8217;s employee handbook contains only one rule: &#8220;Use good judgment in all situations.&#8221; If that&#8217;s all you need, then that&#8217;s all you need. Don&#8217;t bog down employees with unnecessary information. While your business may be a bit too complex for a single-line handbook, the idea remains the same: Say what they need to know and say it&nbsp;quickly.</p><p>When thinking about handbooks, benefits information, onboarding materials, and basic information about the way the business functions probably come to mind. None of these topics are particularly engaging. To make things a little bit more interesting, some notable companies have opted for a more innovative employee manual design. This approach leaves the basic, boilerplate information out of the employee manual and instead offers that information digitally. For a small business, this approach might be a bit much. However, there is no reason a web-based employee manual can&#8217;t be an engaging mix of both aspirational brand values and informative policy information. Your handbook or manual should focus on helping the employee better understand the business, their role within it, and the company&#8217;s brand and&nbsp;values.</p><p>Employee manuals don&#8217;t need to be endless pages of boring corporate information. You are in control of what it contains. What do your employees need to know about working in your organization? What does it mean to be a part of your team? What is acceptable and unacceptable behavior? With a well-written employee handbook, you and your team will work together like a well-oiled machine so that your business can thrive and&nbsp;grow.</p><p><em>Originally published at <a href="https://policyco.io/marketing/2020/01/17/employee-handbooks-and-your-small-business/">https://policyco.io</a> on January 17,&nbsp;2020.</em></p><div><hr></div><p><a href="https://blog.policyco.io/employee-handbooks-and-your-small-business-52ca412ea113">Employee Handbooks and Your Small Business</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[Hyperlink Articles and Procedures]]></title><description><![CDATA[![Hyperlink Articles and Procedures]]></description><link>https://blog.policyco.io/p/hyperlink-articles-and-procedures-5f198c88bfa8</link><guid isPermaLink="false">https://blog.policyco.io/p/hyperlink-articles-and-procedures-5f198c88bfa8</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Fri, 01 Apr 2022 14:03:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!z6ws!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F658b7f9c-3d5d-493b-a261-60da68920c10_480x480.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>![Hyperlink Articles and Procedures</p><p>PolicyCo](https://f.hubspotusercontent40.net/hubfs/5557240/Imported_Blog_Media/screen-shot-2021-01-29-at-11-24-09-pm-1.png)</p><p>Policies and Procedures commonly need to reference other areas of policies. A great deal of planning went into this feature. Standard hyperlinks are inadequate because it&#8217;s not possible to view the information behind the link without navigating to it. Hyperlinks in PolicyCo have a &#8220;peek&#8221; feature that reveals the contents of the linked content inline. This benefits the end user by promoting continuity while disgesting information. In the example above, we have the word Encryption linked to another article. As you can see, the contents of the hyperlink are visible in a window when the user clicks on it. PolicyCo allows linking to articles and procedures internally and also allows off-site links on the web. PolicyCo makes it easy for your organization to quickly establish policies and procedures pre-mapped to HIPAA, SOC2 and HITRUST controls. We have an advanced editor with strict version control and a groundbreaking evidence gathering workflow&nbsp;engine.</p><p><em>Originally published at <a href="https://policyco.io/new%20feature/2021/01/30/hyperlink-articles-and-procedures/">https://policyco.io</a> on January 30,&nbsp;2021.</em></p><div><hr></div><p><a href="https://blog.policyco.io/hyperlink-articles-and-procedures-5f198c88bfa8">Hyperlink Articles and Procedures</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[Bulk Control Management]]></title><description><![CDATA[If you&#8217;ve dealt with compliance frameworks, you understand that not every available control applies to your company.]]></description><link>https://blog.policyco.io/p/bulk-control-management-3b3199db1ea8</link><guid isPermaLink="false">https://blog.policyco.io/p/bulk-control-management-3b3199db1ea8</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Fri, 01 Apr 2022 14:03:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mx5O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mx5O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mx5O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 424w, https://substackcdn.com/image/fetch/$s_!mx5O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 848w, https://substackcdn.com/image/fetch/$s_!mx5O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 1272w, https://substackcdn.com/image/fetch/$s_!mx5O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mx5O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!mx5O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 424w, https://substackcdn.com/image/fetch/$s_!mx5O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 848w, https://substackcdn.com/image/fetch/$s_!mx5O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 1272w, https://substackcdn.com/image/fetch/$s_!mx5O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5abe430d-a485-4bff-a9fa-9efa51161199_700x700.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>If you&#8217;ve dealt with compliance frameworks, you understand that not every available control applies to your company. There may be controls that reference regional requirements or PCI compliance that don&#8217;t apply to your organization. HITRUST has a whopping 1800+ controls. We&#8217;ve made it incredibly easy to filter for classes of controls you don&#8217;t need and mark them as <strong>not applicable</strong>. If you need the control at a later time, it can be reactivated as&nbsp;well.</p><p><em>Originally published at <a href="https://policyco.io/new%20feature/2021/02/24/bulk-control-management/">https://policyco.io</a> on February 24,&nbsp;2021.</em></p><div><hr></div><p><a href="https://blog.policyco.io/bulk-control-management-3b3199db1ea8">Bulk Control Management</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[Link Evidence to External Controls]]></title><description><![CDATA[We did it!]]></description><link>https://blog.policyco.io/p/link-evidence-to-external-controls-230113554c41</link><guid isPermaLink="false">https://blog.policyco.io/p/link-evidence-to-external-controls-230113554c41</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Fri, 01 Apr 2022 14:03:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!E2SZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E2SZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E2SZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 424w, https://substackcdn.com/image/fetch/$s_!E2SZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 848w, https://substackcdn.com/image/fetch/$s_!E2SZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 1272w, https://substackcdn.com/image/fetch/$s_!E2SZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E2SZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!E2SZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 424w, https://substackcdn.com/image/fetch/$s_!E2SZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 848w, https://substackcdn.com/image/fetch/$s_!E2SZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 1272w, https://substackcdn.com/image/fetch/$s_!E2SZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6de77ae2-2056-430b-b709-0bcb0e134589_637x380.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>We did it! Link your evidence-gathering activities to multiple external controls. This incredible feature allows you to carefully manage coverage of your evidence-gathering activities back to each relevant control.<br>Imagine gathering evidence a single time and satisfying multiple controls across multiple frameworks. This update will help you distribute the burden and ensure coverage. Our unique relational approach to managing internal controls, external controls, procedures, and evidence gathering is intuitive and efficient. Want to learn more about our compliance management software platform?</p><p><em>Originally published at <a href="https://policyco.io/new%20feature/2021/07/15/link-evidence-to-external-controls/">https://policyco.io</a> on July 15,&nbsp;2021.</em></p><div><hr></div><p><a href="https://blog.policyco.io/link-evidence-to-external-controls-230113554c41">Link Evidence to External Controls</a> was originally published in <a href="https://blog.policyco.io">PolicyCo</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded></item><item><title><![CDATA[Top 3 Things to do at a New Company for Security]]></title><description><![CDATA[As a new company that is being established, it is highly important you take into account your security measures. You should be doing&#8230;]]></description><link>https://blog.policyco.io/p/top-3-things-to-do-at-a-new-company-for-security-aff693e7b82a</link><guid isPermaLink="false">https://blog.policyco.io/p/top-3-things-to-do-at-a-new-company-for-security-aff693e7b82a</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Tue, 15 Feb 2022 15:41:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GRfl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GRfl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GRfl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GRfl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GRfl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GRfl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GRfl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/efe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GRfl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GRfl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GRfl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GRfl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fefe3af98-1e2d-407c-b6fe-afb280dc3ecd_800x467.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>As a new company that is being established, it is highly important you take into account your security measures. You should be doing several things when it comes to security, and I want to talk you through the top 3 things.</p><p>Know what you have&#8202;&#8212;&#8202;not just the laptops but all hardware, software, and, most importantly, the data. It&#8217;s not the price of a new laptop you should be worried about-It&#8217;s the cost of recovering from the loss of control of the data on that laptop if it&#8217;s stolen, lost, or hacked. Over time files and data tend to find their way into all corners within and sometimes outside your business. People make duplicate copies of files, folders, and databases in new folders or completely separate storage locations. With the advent of cloud and Software as a Service (SaaS) products (often with free versions available), the places your data can end up are only limited by your workforce&#8217;s imagination and the skill of SaaS product marketing teams. Do whatever you can now to establish good data handling, storage, and tracking practices for an early-stage company. Define the different levels of sensitive data you handle and how each will be maintained. Establish scheduled and recurring reviews to confirm that expectations are being met.</p><p>With internal and external people and systems accessing your systems and data from within and via the internet, being sure that whoever or whatever is granted access is who they should be is more important than ever. Access to your website you might be happy for anyone to see. But access to your source code repository, admin access to your applications, full edit rights access to the finance or HR files you want to be confident is only allowed after you have positively confirmed that it&#8217;s your VP of Engineering, your finance team, your HR Director as they claim to attempt to log in. Via LinkedIn, you can quickly learn the names of the finance office/team members for company X. A few guesses, and you can determine the email naming convention for the company. A password is harder to guess but not impossible. People are often tricked into giving up their passwords through social engineering attacks like email phishing. With those two pieces of information, an email address that, if not publicly available, is easily determined, and a password, something that can be guessed by a password cracking routine or captured through deception, an unauthorized user can gain access. By implementing Multi-Factor Authentication, adding at least one more element of identifying information, you complicate the process of gaining unauthorized access dramatically.</p><p>Make sure your people are aware of the threats, how to avoid opening the door for those threats, and how to detect a malicious attempt to compromise the security controls you work so hard to implement. Every employee, consultant, contractor, and partner of your business can be targeted to exploit weaknesses in your security program, so arm them with the knowledge to protect themselves and the company. Rather than emailing a once-a-year 40-page slide deck, mix up the delivery of cyber security tips and knowledge. A mix of short and catchy videos, newsletters, infographics, live briefings, interactive discussions, news bulletin emails, etc., delivered throughout the year will help make the information more exciting and fresh in the minds of your team.</p><p><em>Originally published at <a href="https://policyco.io/best%20practices/security%20and%20compliance/2022/02/15/top-3-things-to-do-at-a-new-company-for-security/">https://policyco.io</a> on February 15, 2022.</em></p>]]></content:encoded></item><item><title><![CDATA[Buckle Up with NIST Cybersecurity Framework (CSF)]]></title><description><![CDATA[Your roadmap to Flexibility, Repeatability, and Clarity.]]></description><link>https://blog.policyco.io/p/buckle-up-with-nist-cybersecurity-framework-csf-7b6bb173c780</link><guid isPermaLink="false">https://blog.policyco.io/p/buckle-up-with-nist-cybersecurity-framework-csf-7b6bb173c780</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Tue, 01 Feb 2022 21:26:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rczG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rczG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rczG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rczG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rczG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rczG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rczG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rczG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rczG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rczG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rczG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7a39a7d5-e8e6-400a-b286-4c6bf2b67865_800x466.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Your roadmap to Flexibility, Repeatability, and Clarity.</p><p>The National Institute of Standards and Technology (NIST) seeks to advance measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. The NIST Cybersecurity Framework is a standard developed and maintained by NIST to do just that, enhance economic security and improve quality of life.</p><p>The CSF was developed by the National Institute of Standards and Technology, a United States non-regulatory governmental agency housed under the Department of Commerce. Today, NIST standards are employed in fields from nanotechnology to cybersecurity. In 2013, NIST was tasked with developing a Cybersecurity Framework through an executive order and published version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity in February 2014. Version 1.1 was made available in April 2018. The CSF is one of NIST&#8217;s voluntary programs based on existing standards and guidelines and is developed with flexibility to help organizations better manage and reduce cybersecurity risk. The CSF is presented in a 48-page document that details different cybersecurity activities and desired outcomes that organizations can leverage for assessing an organization&#8217;s cybersecurity risk, risk maturity, and infrastructure around information security.</p><h3>What is NIST CSF Used&nbsp;for?</h3><p>The CSF has three major components&#8202;&#8212;&#8202;the framework core, implementation tiers, and profiles&#8202;&#8212;&#8202;designed to help you benchmark your organization&#8217;s risk maturity and prioritize actions you need to take to make improvements.</p><h3>The 3 parts of the framework (Diagram&nbsp;1)</h3><p><strong>Framework Core</strong>&#8202;&#8212;&#8202;A set of cybersecurity activities, desired outcomes, and relevant references common across critical infrastructure sectors. It consists of five concurrent and continuous Functions: Identity, Protect, Detect, Respond and Recover. <strong>Implementation Tier&#8202;</strong>&#8212;&#8202;Implementation tiers describe the degree to which an organization&#8217;s cybersecurity risk management practices exhibit the characteristics defined in the Framework, over a range from Partial (Tier 1) to Adaptive (Tier 4). <strong>Framework Profile&#8202;</strong>&#8212;&#8202;A framework profile represents the Core Functions&#8217; Categories and Subcategories prioritized by an organization based on business needs and can measure the organization&#8217;s progress toward the Target Profile.</p><h3>The 5 Core Functions (Diagram&nbsp;2)</h3><p>When considered together, the 5 Core Functions provide a strategic view of the lifecycle of an organization&#8217;s cybersecurity risk management and should be treated as a critical reference point. Here are the 5 Functions and how to comply with them:</p><p><strong>Note</strong>: The Core Functions are intuitive and collectively with the Implementation Tiers and Profiles make for an easy-to-grasp blueprint that speeds adoption and provides ongoing guidance.</p><p>It is essential to understand that it is not a set of rules, controls, or tools. Instead, it offers a set of processes that can help organizations measure the maturity of their current cybersecurity and risk management policies, procedures, and practices and identify steps to strengthen them. The use of the NIST CSF offers multiple benefits. In particular, it can help you:</p><p>Gain a better understanding of your security risks Prioritize the activities that are the most critical Identify mitigation strategies Evaluate potential tools and processes Measure the ROI of cybersecurity investments Communicate effectively with all stakeholders, including IT, business, and executive teams</p><p>Adoption of the NIST CyberSecurity Framework provides a common, intuitive, and understandable language of risk-based security. Your technical, sales, customer support, executive, and finance teams will share the same understanding and terminology. NIST CSF enables an integrated risk management approach to cyber security management aligned with business goals. It provides a framework to align efforts across all departments to ensure that the risk management goals are set and met. When all departments understand the risks and work together, you have an organization in an excellent position to achieve its goals.</p><p>Cybersecurity risks are present in nearly every aspect of today&#8217;s technology-enabled businesses. Trying to keep up with them all and addressing them one by one is a recipe for competing priorities, inefficient allocation of resources, and burnout. The NIST CSF provides a risk-based approach to identify and understand your security landscape and then build a balanced and well-justified security roadmap. This integrated risk management approach enables the development and implementation of a cybersecurity management program aligned with business goals. The result is better communication, more effective decision-making throughout your organization, and well-informed and supported budgets. Adoption develops a common language for business and technical stakeholders alike, facilitating improved buy-in and success throughout the organization. PolicyCo provides a platform where cybersecurity maturity roadmaps for enterprises of all sizes are developed, implemented, monitored, and improved.</p><p>Framework for Improving Critical Infrastructure Cybersecurity and related news and information Cybersecurity resources within NIST</p><p><em>Originally published at <a href="https://policyco.io/new%20feature/2022/02/01/buckle-up-with-nist-cybersecurity-framework-csf/">https://policyco.io</a> on February 1, 2022.</em></p>]]></content:encoded></item><item><title><![CDATA[Better Version Control for Policies]]></title><description><![CDATA[When I started the PolicyCo journey, I always focused on treating policy like we treat the agile process for software development. Being&#8230;]]></description><link>https://blog.policyco.io/p/better-version-control-for-policies-f43ac32a25a8</link><guid isPermaLink="false">https://blog.policyco.io/p/better-version-control-for-policies-f43ac32a25a8</guid><dc:creator><![CDATA[PolicyCo]]></dc:creator><pubDate>Thu, 13 Jan 2022 20:59:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xYCS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xYCS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xYCS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xYCS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xYCS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xYCS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xYCS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xYCS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xYCS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xYCS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xYCS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F576b97a9-884d-48dc-aa9c-943a0cce487c_800x466.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>When I started the PolicyCo journey, I always focused on treating policy like we treat the agile process for software development. Being agile doesn&#8217;t mean the process is perfect, but it does allow for flexibility, transparency, and accountability. PolicyCo&#8217;s system stresses these qualities by having a documented and reportable workflow at each step of the process, including versioned commits, branch management, release candidates, code reviews, and limited role access for deployments. These are all important for the evolution of policy management.</p><p>Those responsible for writing policy aren&#8217;t programmers, and the concepts mentioned above can be overly technical. Balancing flexibility and usability is essential when applying programming concepts to policy management evolution. This is an effort to get my thoughts on paper to talk about how PolicyCo addresses this today and, more importantly, how we plan to close the loop in the future.</p><h3><strong>Some Background</strong></h3><p>Before getting into the details, it&#8217;s essential to understand that PolicyCo takes a unique approach to writing and ensuring compliance with policy. We believe that process is to break down the policy into articles. A policy is typically centered around a broad theme, regulation, or law. At the same time, the articles break down the specific requirements and business strategies into testable areas within that more general theme. Software developers don&#8217;t place all of their code into a single file; it&#8217;s a collection of files related to one another, each with a specific function. There is strength derived from adopting this mindset. Controls can be built specifically to each article mapped directly to the policy (e.g., security frameworks or federal regulations). These mappings ensure that the organization is testing for compliance at the granular level, ensuring accountability, and can be extended logically as your organization grows into new regulatory areas.</p><h3><strong>Versioned Commits</strong></h3><p>When developers commit code, they submit their changes to a central repository. Team members, with the proper permission, can see (a) the exact code that was committed, (b) the difference between the new and old code, &#169; the exact time it was committed, and (d) the identity of the individual. In fact, not only can this information be viewed at the time of the commit, but it&#8217;s possible to go back in time to see the entire history of all commits from the beginning.</p><p>This same process can be used for versioning Policy. At the moment, PolicyCo requires users to (a) write/edit a draft article of a Policy, (b) submit it for review to the appropriate governance level, and then &#169; publish it. This does provide accountability, but it&#8217;s clear we are still missing a step. If we were to compare this to a coding process, it most closely resembles a commit accepted through a PR (pull request). But just because a commit has been accepted via a PR doesn&#8217;t mean it&#8217;s ready for prime time. It&#8217;s essential to orchestrate multiple commits into a release and then deploy that release responsibly. So, for policy, that would mean understanding your organization&#8217;s governance process to ensure Policy updates are documented and approved by that structure. PolicyCo has developed a workflow that will work for any organization&#8217;s governance structure to ensure that each updated version of an article is incorporated into the policy and that the appropriate authority approves policy within your organization. Each stage of the review and approval process is viewable, documented, and reportable, including seeing prior versions.</p><h3><strong>Branch Management</strong></h3><p>In the software development world, we manage branches religiously. There are many philosophies but think of branches as parallel highway lanes that eventually merge into one. Following our logic above for draft articles, it is possible to change several articles within an overall policy. Under our current workflow, after the changes pass through the review and publish stages, it&#8217;s immediately effective; that is to say, it is now <strong>an active part</strong> of your new policy, however, to ensure your specific organization&#8217;s governance process is incorporated into our system, we are modifying the process to ensure that once the articles are modified, you have control to review and approve the policy in accordance with your organization&#8217;s governance process. Suppose you have a specific review date or period for reviewing and updating policies (whether due to a set time or update related to regulation or new law). In that case, our process will ensure that you are notified of the need to review and update the relevant articles. Once those articles have been updated and approved by your organization, the policy as a whole document will be ready for review, approval by your governing body, and then publication. This automated workflow process ensures that each article impacted by the change is reviewed and updated and the policy as a whole.</p><h3><strong>Release Candidates</strong></h3><p>We are actively planning to change the term <strong>published</strong> to <strong>approved.</strong> The reasoning here is that when an article reaches a published state, it&#8217;s still <strong>not</strong> ready to become public. We need another step to allow the manager to review approved articles and incorporate them into a new policy version for the appropriate governing body to approve the policy. Additionally, your organization may not want to publish immediately upon approval, so we&#8217;ve added the ability to specify an effective date for publication a policy. Drawing from software development, we plan to use minor versions (1.0.1) to indicate release candidates (article approvals) and major versions (1.1) to indicate policy releases.</p><h3><strong>Deployment</strong></h3><p>Deploying software involves gathering up commits that have passed muster and merging them into the main branch. A sophisticated framework called git makes it relatively easy to ensure that new code is responsibly introduced into production. Since we have defined <strong>approved</strong> articles as eligible commits, let&#8217;s follow the table below to understand how we can responsibly version policy over time, providing accountability for new content. For our example below, let&#8217;s assume that your current policy is version 1.0 with an effective date of 1/1/2022.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PiuA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PiuA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 424w, https://substackcdn.com/image/fetch/$s_!PiuA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 848w, https://substackcdn.com/image/fetch/$s_!PiuA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 1272w, https://substackcdn.com/image/fetch/$s_!PiuA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PiuA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PiuA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 424w, https://substackcdn.com/image/fetch/$s_!PiuA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 848w, https://substackcdn.com/image/fetch/$s_!PiuA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 1272w, https://substackcdn.com/image/fetch/$s_!PiuA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5597acb8-7b96-4668-90cc-55a7257e8749_769x738.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>So, at this point, the effective policy is still 1.0, and we have two candidate policies ready for your organization&#8217;s governing body to approve:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rMUX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rMUX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 424w, https://substackcdn.com/image/fetch/$s_!rMUX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 848w, https://substackcdn.com/image/fetch/$s_!rMUX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 1272w, https://substackcdn.com/image/fetch/$s_!rMUX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rMUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rMUX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 424w, https://substackcdn.com/image/fetch/$s_!rMUX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 848w, https://substackcdn.com/image/fetch/$s_!rMUX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 1272w, https://substackcdn.com/image/fetch/$s_!rMUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7da7e0aa-500c-4e52-848a-fe0ab309dcdc_471x298.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>As you can see, each policy candidate contains the cumulative changes from the minor versions generated as articles are approved. Since each candidate is cumulative, <strong>it&#8217;s only possible to promote the highest candidate version</strong>. At this point, it&#8217;s important to note that each organization may have different rules that need to be followed to promote a candidate to a release. Some may require board approval, while others may only require Manager level approval. Also, notably at the time of release, it&#8217;s essential to require an effective date to make crossover impossible. Document control ensures that two different versions of the same policy will not be active during the same period.</p><p>Let&#8217;s assume that we are ready to publish Policy 1.0.2. An authorized manager for the policy will select it from the list of candidates, ensure the appropriate approval has been obtained and set the publication release date. Your organization will have the ability to decide whether to name that version 1.1 or 2.0. The flexibility of our system ensures that you can choose whether to publish after an article (or articles) are approved or to ensure publication only after the whole policy has been approved. Following this, you may set the publication date immediately upon obtaining approval or an effective date set as far into the future as you like. Let&#8217;s make the following selections:</p><p>Policy version 1.1, Effective 2/1/2022</p><p>This policy will automatically take effect on the date chosen, in this case, February 1, 2022. The cycle will now start over, but now the baseline is version 1.1, and candidates will increment as 1.1.1, 1.1.2 until they are promoted to a new release Policy version. You will be able to see the prior version 1.0 and the draft articles 1.1.1 and 1.1.2, which have not yet been published, and 1.1, the new updated version Policy.</p><p>I hope this has been helpful. We haven&#8217;t completed this work yet and would be happy to hear from you if you have any questions or suggestions about modifying our approach to this process.</p><p><em>Originally published at <a href="https://policyco.io/marketing/best%20practices/2022/01/13/better-version-control-for-policies/">https://policyco.io</a> on January 13, 2022.</em></p>]]></content:encoded></item></channel></rss>