{"id":5406,"date":"2022-01-24T08:17:00","date_gmt":"2022-01-24T07:17:00","guid":{"rendered":"http:\/\/dev1.replior.mobi\/?p=5406"},"modified":"2026-04-03T22:48:18","modified_gmt":"2026-04-03T20:48:18","slug":"5-tips-for-writing-an-information-security-policy","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/5-tips-for-writing-an-information-security-policy\/","title":{"rendered":"5 tips for writing an Information Security Policy"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns5406_e02b03-f9\"><a class=\"kb-button kt-button button kb-btn5406_f3ebda-6b kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading5406_818cd2-4c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_818cd2-4c\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading5406_312d5a-3b animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_312d5a-3b\">5 tips for writing an Information Security Policy<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tJan 24, 2022\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading5406_e5f28b-c1 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading5406_e5f28b-c1\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">2 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image5406_183565-13\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-scaled.png\" alt=\"man holding a lightbulb as he has gotten an idea\" class=\"kb-img wp-image-80264\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-scaled.png 2560w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-300x169.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-1024x576.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-768x432.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-1536x864.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-2048x1152.png 2048w, https:\/\/complior.se\/wp-content\/uploads\/2026\/04\/5-tips-02-edited-18x10.png 18w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-1snti2e is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading5406_a7ac23-14 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_a7ac23-14\">The role of policies in GDPR<\/h2>\n\n\n\n<p class=\"kt-adv-heading5406_5f99d7-ac wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_5f99d7-ac\">One thing that is mentioned a lot when it comes to GDPR is policies. A large part of how companies demonstrate compliance with GDPR is through documentation and policies. The regulation, for example, requires a data protection and information security policy to exist, as well as a privacy policy.<\/p>\n\n\n\n<p class=\"kt-adv-heading5406_1b8506-09 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_1b8506-09\">A data protection and information security policy is a document that describes the organisation and its overall routines and processes in relation to the handling and processing of personal data. <\/p>\n\n\n\n<p class=\"kt-adv-heading5406_305828-cd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_305828-cd\">It can be time consuming to create a policy, and there are a few important things to keep in mind when developing an information security policy.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1snti2e is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading5406_2dd21a-58 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_2dd21a-58\">What an information security policy should include<\/h2>\n\n\n\n<p class=\"kt-adv-heading5406_6641cb-cc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_6641cb-cc\">As of now, there isn\u2019t a specific template to follow when writing a GDPR information security policy. Our advice is therefore to base it on the ISO 27001 standard and adjust the policy to the requirements prioritised in GDPR.<\/p>\n\n\n\n<p class=\"kt-adv-heading5406_ffaa5f-15 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_ffaa5f-15\">The document should include a general description of the policy, scope, stakeholders and their requirements. It should also include the following:<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-12lzvbb is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading5406_c859b7-dc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_c859b7-dc\">Core components of the policy<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1rgnhgz has-manrope-font-family\">\n<li>Organisation (stakeholders, scope)<\/li>\n\n\n\n<li>Leadership (management structure, policy, responsibility)<\/li>\n\n\n\n<li>Planning (risks\/opportunities, goals)<\/li>\n\n\n\n<li>Support (resources, competence, awareness, documentation)<\/li>\n\n\n\n<li>Activities (planning, assessment and handling of risks)<\/li>\n\n\n\n<li>Evaluation of performance (measurement, analysis, evaluation, audit)<\/li>\n\n\n\n<li>Improvements (and deviations)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1icxrev is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading5406_db7d5e-bd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_db7d5e-bd\">GDPR-specific considerations<\/h2>\n\n\n\n<p class=\"kt-adv-heading5406_c54f9e-01 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_c54f9e-01\">To adapt the policy to GDPR, it is important to document and specify areas prioritised in the regulation. These include access control, Security by Design, assets such as records of data processing activities, and incident handling, since GDPR requires quick reporting of incidents.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-8q2jcr is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading5406_f3b1e1-c9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_f3b1e1-c9\">5 quick tips for writing an information security policy<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-12lzvbb is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading5406_f769f0-78 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_f769f0-78\">Use clear and familiar language<\/h3>\n\n\n\n<p class=\"kt-adv-heading5406_f13ab9-5a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_f13ab9-5a\">Decide which language to use, everyone should be able to understand the content of the policy. Use terms and language already familiar within the organisation.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-12lzvbb is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading5406_95fe87-3a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_95fe87-3a\">Involve the entire organisation<\/h3>\n\n\n\n<p class=\"kt-adv-heading5406_9c4885-b7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_9c4885-b7\">Involve people across the organisation before, during and after writing the policy. Even though it is mainly a management document, broad involvement is important. Continuous internal training is also key.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-12lzvbb is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading5406_a41ce3-54 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_a41ce3-54\">Reuse existing policies<\/h3>\n\n\n\n<p class=\"kt-adv-heading5406_c4a7a7-16 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_c4a7a7-16\">If you already have policies in place, reuse what works. Some parts of older policies may still be highly effective.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-12lzvbb is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading5406_389f38-d9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_389f38-d9\">Keep it simple<\/h3>\n\n\n\n<p class=\"kt-adv-heading5406_cf948a-0f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_cf948a-0f\">At the policy level, focus on being broad and strategic. Avoid unnecessary detail and instead emphasise purpose and goals.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-12lzvbb is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading5406_85bf8b-5d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_85bf8b-5d\">Treat the policy as a living document<\/h3>\n\n\n\n<p class=\"kt-adv-heading5406_2907aa-10 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5406_2907aa-10\">Don\u2019t be afraid to change a policy. It should be continuously updated to stay relevant and effective.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind<\/p>","protected":false},"author":2,"featured_media":73512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":2,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,146,141],"class_list":["post-5406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-information-security","tag-policy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 tips for writing an Information Security Policy - Complior<\/title>\n<meta name=\"description\" content=\"5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/5-tips-for-writing-an-information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 tips for writing an Information Security Policy - Complior\" \/>\n<meta property=\"og:description\" content=\"5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/5-tips-for-writing-an-information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-24T07:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T20:48:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"5 tips for writing an Information Security Policy\",\"datePublished\":\"2022-01-24T07:17:00+00:00\",\"dateModified\":\"2026-04-03T20:48:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/5-tips-02-scaled.png\",\"keywords\":[\"Blog\",\"Information security\",\"Policy\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/\",\"name\":\"5 tips for writing an Information Security Policy - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/5-tips-02-scaled.png\",\"datePublished\":\"2022-01-24T07:17:00+00:00\",\"dateModified\":\"2026-04-03T20:48:18+00:00\",\"description\":\"5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/5-tips-02-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/5-tips-02-scaled.png\",\"width\":2560,\"height\":1340,\"caption\":\"man holding a lightbulb as he has gotten an idea\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/5-tips-for-writing-an-information-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 tips for writing an Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 tips for writing an Information Security Policy - Complior","description":"5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/5-tips-for-writing-an-information-security-policy\/","og_locale":"en_GB","og_type":"article","og_title":"5 tips for writing an Information Security Policy - Complior","og_description":"5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind","og_url":"https:\/\/complior.se\/en\/5-tips-for-writing-an-information-security-policy\/","og_site_name":"Complior","article_published_time":"2022-01-24T07:17:00+00:00","article_modified_time":"2026-04-03T20:48:18+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-scaled.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/#article","isPartOf":{"@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"5 tips for writing an Information Security Policy","datePublished":"2022-01-24T07:17:00+00:00","dateModified":"2026-04-03T20:48:18+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/"},"wordCount":422,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-scaled.png","keywords":["Blog","Information security","Policy"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/","url":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/","name":"5 tips for writing an Information Security Policy - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-scaled.png","datePublished":"2022-01-24T07:17:00+00:00","dateModified":"2026-04-03T20:48:18+00:00","description":"5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind","breadcrumb":{"@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-scaled.png","width":2560,"height":1340,"caption":"man holding a lightbulb as he has gotten an idea"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/5-tips-for-writing-an-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"5 tips for writing an Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-scaled.png",2560,1340,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-300x157.png",300,157,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-768x402.png",768,402,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-1024x536.png",1024,536,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-1536x804.png",1536,804,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-2048x1072.png",2048,1072,true],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2021\/10\/5-tips-02-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/5406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=5406"}],"version-history":[{"count":5,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/5406\/revisions"}],"predecessor-version":[{"id":80289,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/5406\/revisions\/80289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/73512"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=5406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=5406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=5406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}