You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/data/dist/index.js
+30-55Lines changed: 30 additions & 55 deletions
Original file line number
Diff line number
Diff line change
@@ -158,9 +158,8 @@ var accessControlPolicy = {
158
158
type: "doc",
159
159
metadata: {
160
160
id: "access_control",
161
-
slug: "access-control-policy",
162
161
name: "Access Control Policy",
163
-
description: "This policy defines the requirements for granting, monitoring, and revoking access to the organization's information systems and data based on the principle of least privilege.",
162
+
description: "This policy defines the requirements for controlling access to information systems and data based on the principle of least privilege.",
164
163
frequency: "yearly",
165
164
department: "it"
166
165
},
@@ -310,7 +309,6 @@ var applicationSecurityPolicy = {
310
309
type: "doc",
311
310
metadata: {
312
311
id: "application_security",
313
-
slug: "application-security-policy",
314
312
name: "Application Security Policy",
315
313
description: "This policy outlines the security framework and requirements for applications, notably web applications, within the organization's production environment.",
316
314
frequency: "yearly",
@@ -954,9 +952,8 @@ var availabilityPolicy = {
954
952
type: "doc",
955
953
metadata: {
956
954
id: "availability",
957
-
slug: "availability-policy",
958
955
name: "Availability Policy",
959
-
description: "This policy outlines the requirements for proper controls to protect the availability of the organization's information systems.",
956
+
description: "This policy defines the requirements for ensuring that information systems and data are available for use when needed.",
960
957
frequency: "yearly",
961
958
department: "it"
962
959
},
@@ -1656,11 +1653,10 @@ var businessContinuityPolicy = {
description: "This policy outlines the strategies and procedures for ensuring the availability of critical systems and data during and after a disruptive event.",
1656
+
name: "Business Continuity Policy",
1657
+
description: "This policy outlines the procedures and strategies for ensuring that essential business functions can continue during and after a disruption.",
1662
1658
frequency: "yearly",
1663
-
department: "it"
1659
+
department: "gov"
1664
1660
},
1665
1661
content: [
1666
1662
{
@@ -1815,9 +1811,8 @@ var changeManagementPolicy = {
1815
1811
type: "doc",
1816
1812
metadata: {
1817
1813
id: "change_management",
1818
-
slug: "change-management-policy",
1819
1814
name: "Change Management Policy",
1820
-
description: "This policy defines the process for requesting, reviewing, approving, and documenting changes to the organization's information systems and infrastructure.",
1815
+
description: "This policy establishes standardized procedures for managing changes to IT systems and infrastructure to minimize risk and disruption.",
1821
1816
frequency: "yearly",
1822
1817
department: "it"
1823
1818
},
@@ -1966,10 +1961,9 @@ var changeManagementPolicy = {
1966
1961
varclassificationPolicy={
1967
1962
type: "doc",
1968
1963
metadata: {
1969
-
id: "data_classification",
1970
-
slug: "data-classification-policy",
1971
-
name: "Data Classification Policy",
1972
-
description: "This policy outlines the requirements for data classification.",
1964
+
id: "classification",
1965
+
name: "General Classification Policy",
1966
+
description: "This policy provides a general framework for classification of assets and information.",
1973
1967
frequency: "yearly",
1974
1968
department: "gov"
1975
1969
},
@@ -2507,9 +2501,8 @@ var codeOfConductPolicy = {
2507
2501
type: "doc",
2508
2502
metadata: {
2509
2503
id: "code_of_conduct",
2510
-
slug: "code-of-conduct",
2511
2504
name: "Code of Conduct Policy",
2512
-
description: "This policy outlines the expected behavior from employees towards their colleagues, supervisors, and the organization as a whole.",
2505
+
description: "This policy outlines the expected standards of behavior and ethical conduct for all employees and representatives of the organization.",
2513
2506
frequency: "yearly",
2514
2507
department: "hr"
2515
2508
},
@@ -2867,9 +2860,8 @@ var confidentialityPolicy = {
2867
2860
type: "doc",
2868
2861
metadata: {
2869
2862
id: "confidentiality",
2870
-
slug: "confidentiality",
2871
2863
name: "Confidentiality Policy",
2872
-
description: "This policy outlines the requirements for maintaining the confidentiality of sensitive and proprietary information within the organization.",
2864
+
description: "This policy defines the requirements for protecting confidential information from unauthorized access, use, or disclosure.",
2873
2865
frequency: "yearly",
2874
2866
department: "gov"
2875
2867
},
@@ -3214,11 +3206,10 @@ var corporateGovernancePolicy = {
3214
3206
type: "doc",
3215
3207
metadata: {
3216
3208
id: "corporate_governance",
3217
-
slug: "corporate-governance-policy",
3218
3209
name: "Corporate Governance Policy",
3219
-
description: "This policy defines the overall governance framework including board oversight, management responsibilities, and organizational structure to ensure effective oversight and accountability.",
3210
+
description: "This policy outlines the structure, responsibilities, and processes that guide the organization's overall direction and management.",
3220
3211
frequency: "yearly",
3221
-
department: "admin"
3212
+
department: "gov"
3222
3213
},
3223
3214
content: [
3224
3215
{
@@ -3449,9 +3440,8 @@ var cyberRiskPolicy = {
3449
3440
type: "doc",
3450
3441
metadata: {
3451
3442
id: "cyber_risk",
3452
-
slug: "cyber-risk",
3453
-
name: "Cyber Risk Assessment Policy",
3454
-
description: "This policy outlines the requirements for conducting cyber risk assessments to identify, evaluate, and mitigate cybersecurity threats to the organization.",
3443
+
name: "Cyber Risk Policy",
3444
+
description: "This policy outlines the strategies and procedures for identifying, assessing, and mitigating cyber risks to protect organizational assets and ensure operational resilience.",
3455
3445
frequency: "yearly",
3456
3446
department: "it"
3457
3447
},
@@ -3771,9 +3761,8 @@ var dataCenterPolicy = {
3771
3761
type: "doc",
3772
3762
metadata: {
3773
3763
id: "data_center",
3774
-
slug: "data-center",
3775
3764
name: "Data Center Policy",
3776
-
description: "This policy outlines the requirements for the organization's data center facilities to ensure protection, availability, and reliability of critical systems and data.",
3765
+
description: "This policy outlines the security and operational requirements for data centers to protect physical infrastructure and ensure service availability.",
3777
3766
frequency: "yearly",
3778
3767
department: "it"
3779
3768
},
@@ -4134,9 +4123,8 @@ var dataClassificationPolicy = {
4134
4123
type: "doc",
4135
4124
metadata: {
4136
4125
id: "data_classification",
4137
-
slug: "data-classification-policy",
4138
4126
name: "Data Classification Policy",
4139
-
description: "This policy establishes a framework for classifying data based on sensitivity and defines handling requirements for each classification level.",
4127
+
description: "This policy establishes guidelines for classifying data based on its sensitivity and defining handling requirements for each classification level.",
4140
4128
frequency: "yearly",
4141
4129
department: "gov"
4142
4130
},
@@ -4286,9 +4274,8 @@ var disasterRecoveryPolicy = {
4286
4274
type: "doc",
4287
4275
metadata: {
4288
4276
id: "disaster_recovery",
4289
-
slug: "disaster-recovery-policy",
4290
4277
name: "Disaster Recovery Policy",
4291
-
description: "This policy outlines the requirements for disaster recovery planning to ensure the organization can recover from disruptive events.",
4278
+
description: "This policy outlines the procedures for recovering IT systems and data in the event of a disaster to ensure business continuity.",
4292
4279
frequency: "yearly",
4293
4280
department: "it"
4294
4281
},
@@ -4469,9 +4456,8 @@ var humanResourcesPolicy = {
4469
4456
type: "doc",
4470
4457
metadata: {
4471
4458
id: "human_resources",
4472
-
slug: "human-resources-policy",
4473
4459
name: "Human Resources Policy",
4474
-
description: "This policy outlines the principles and practices for recruitment, employee management, performance evaluations, and the enforcement of internal control responsibilities.",
4460
+
description: "This policy defines guidelines for HR practices including employee conduct, data privacy, and security awareness.",
4475
4461
frequency: "yearly",
4476
4462
department: "hr"
4477
4463
},
@@ -4621,9 +4607,8 @@ var incidentResponsePolicy = {
4621
4607
type: "doc",
4622
4608
metadata: {
4623
4609
id: "incident_response",
4624
-
slug: "incident-response-policy",
4625
4610
name: "Incident Response Policy",
4626
-
description: "This policy establishes the framework and procedures for detecting, responding to, and recovering from security incidents.",
4611
+
description: "This policy outlines the procedures for responding to and managing security incidents to minimize impact and restore normal operations quickly.",
4627
4612
frequency: "yearly",
4628
4613
department: "it"
4629
4614
},
@@ -4773,7 +4758,6 @@ var informationSecurityPolicy = {
4773
4758
type: "doc",
4774
4759
metadata: {
4775
4760
id: "information_security",
4776
-
slug: "information-security-policy",
4777
4761
name: "Information Security Policy",
4778
4762
description: "This policy establishes the framework for protecting the organization's information assets by defining security objectives, roles, responsibilities, and controls.",
4779
4763
frequency: "yearly",
@@ -4940,9 +4924,8 @@ var passwordPolicy = {
4940
4924
type: "doc",
4941
4925
metadata: {
4942
4926
id: "password_policy",
4943
-
slug: "password-policy",
4944
4927
name: "Password Policy",
4945
-
description: "This policy outlines the requirements for passwords used by employees.",
4928
+
description: "This policy defines the requirements for creating and managing strong passwords.",
4946
4929
frequency: "yearly",
4947
4930
department: "it"
4948
4931
},
@@ -4953,10 +4936,9 @@ var passwordPolicy = {
4953
4936
varprivacyPolicy={
4954
4937
type: "doc",
4955
4938
metadata: {
4956
-
id: "privacy",
4957
-
slug: "privacy-policy",
4939
+
id: "privacy_policy",
4958
4940
name: "Privacy Policy",
4959
-
description: "This policy describes how the organization collects, uses, discloses, and protects personal information in compliance with applicable privacy regulations.",
4941
+
description: "This policy outlines the criteria and procedures for handling personal data and ensuring compliance with privacy regulations.",
4960
4942
frequency: "yearly",
4961
4943
department: "gov"
4962
4944
},
@@ -5106,9 +5088,8 @@ var riskAssessmentPolicy = {
5106
5088
type: "doc",
5107
5089
metadata: {
5108
5090
id: "risk_assessment",
5109
-
slug: "risk-assessment",
5110
5091
name: "Risk Assessment Policy",
5111
-
description: "This policy outlines the requirements for conducting risk assessments to identify, evaluate, and mitigate risks associated with the organization's information systems, operations, and assets.",
5092
+
description: "This policy defines the process and responsibilities for conducting risk assessments to identify, analyze, and evaluate potential threats and vulnerabilities.",
5112
5093
frequency: "yearly",
5113
5094
department: "gov"
5114
5095
},
@@ -5361,9 +5342,8 @@ var riskManagementPolicy = {
5361
5342
type: "doc",
5362
5343
metadata: {
5363
5344
id: "risk_management",
5364
-
slug: "risk-management-policy",
5365
5345
name: "Risk Management Policy",
5366
-
description: "This policy defines the process for identifying, assessing, and mitigating risks to the organization's objectives and information assets.",
5346
+
description: "This policy establishes the framework for identifying, assessing, treating, and monitoring risks across the organization to protect its assets and achieve its objectives.",
5367
5347
frequency: "yearly",
5368
5348
department: "gov"
5369
5349
},
@@ -5528,7 +5508,6 @@ var softwareDevelopmentPolicy = {
5528
5508
type: "doc",
5529
5509
metadata: {
5530
5510
id: "software_development",
5531
-
slug: "software-development",
5532
5511
name: "Software Development Lifecycle Policy",
5533
5512
description: "This policy outlines the requirements for the software development lifecycle to ensure secure, reliable, and high-quality software development practices.",
5534
5513
frequency: "yearly",
@@ -5777,9 +5756,8 @@ var systemChangePolicy = {
5777
5756
type: "doc",
5778
5757
metadata: {
5779
5758
id: "system_change",
5780
-
slug: "system-change-policy",
5781
5759
name: "System Change Policy",
5782
-
description: "This policy outlines the requirements for system changes.",
5760
+
description: "This policy outlines the requirements for system changes to ensure secure, reliable, and high-quality software development practices.",
5783
5761
frequency: "yearly",
5784
5762
department: "it"
5785
5763
},
@@ -5950,12 +5928,11 @@ var systemChangePolicy = {
5950
5928
varthirdPartyPolicy={
5951
5929
type: "doc",
5952
5930
metadata: {
5953
-
id: "thirdparty",
5954
-
slug: "thirdparty",
5955
-
name: "Third-Party Management Policy",
5956
-
description: "This policy defines the rules for relationships with the organization's Information Technology (IT) third-parties and partners.",
5931
+
id: "third_party",
5932
+
name: "Third Party Policy",
5933
+
description: "This policy outlines the requirements for third party integrations to ensure secure, reliable, and high-quality software development practices.",
5957
5934
frequency: "yearly",
5958
-
department: "gov"
5935
+
department: "it"
5959
5936
},
5960
5937
content: [
5961
5938
{
@@ -6198,7 +6175,6 @@ var vendorRiskManagementPolicy = {
6198
6175
type: "doc",
6199
6176
metadata: {
6200
6177
id: "vendor_risk_management",
6201
-
slug: "vendor-risk-management-policy",
6202
6178
name: "Vendor Risk Management Policy",
6203
6179
description: "This policy outlines the criteria and procedures for evaluating, selecting, and monitoring third-party vendors to manage risks associated with external service providers.",
6204
6180
frequency: "yearly",
@@ -6350,7 +6326,6 @@ var workstationPolicy = {
6350
6326
type: "doc",
6351
6327
metadata: {
6352
6328
id: "workstation",
6353
-
slug: "workstation",
6354
6329
name: "Workstation Policy",
6355
6330
description: "This policy outlines the requirements for workstations to ensure secure, reliable, and high-quality software development practices.",
0 commit comments