Enablers Association Information Security Policy

Version: 1.0
Effective Date: 1January 2026
Approved by: Enablers Mission Circle
Questions? [email protected]

  1. Why This Policy Exists

When we work with clients, we handle information about their people – names, roles, performance feedback, coaching notes. Our clients trust us to keep this information safe. This policy explains the simple security practices all members must follow to protect client information.

This is not complicated. We’re not asking you to become IT experts. We’re asking you to follow basic professional practices that protect our clients and our reputation.

  1. Who This Applies To

This policy applies to all Active Members and Associates when working on Association client projects.

  1. Seven Simple Security Rules

Rule 1: Use Secure Tools for Client Work

For email:

  • Use your Enablers Google Workspace email when you have one
  • If using your own email, use a professional provider (Gmail, Outlook, ProtonMail)
  • These providers automatically encrypt emails in transit – no extra steps needed

For file sharing:

  • Official project documents: Use Google Drive (our shared workspace)
  • Large files: Google Drive or Dropbox are fine
  • Participant information: Never use WeTransfer or email attachments
  • Why: WeTransfer and email attachments are not secure enough for personal data

For documents:

  • Microsoft Office (Word, Excel, PowerPoint) and Google Docs are both fine
  • Save official project documents to the Google Drive shared folders

Rule 2: Protect Documents with Participant Information

If a document contains participant names, feedback, or personal information:

In Microsoft Office (Word/Excel/PowerPoint):

  1. Click FileInfoProtect DocumentEncrypt with Password
  2. Choose a strong password (8+ characters, mix letters and numbers)
  3. Share the password separately (phone call or separate message, never in same email as file)

In Google Docs:

  • Don’t put participant names in Google Docs titles
  • Use Google Drive sharing controls (only share with people who need access)
  • If sending outside Google Drive, download as Word and password-protect it

Examples of what needs protection:

  • Workshop feedback with names
  • Coaching session notes
  • Team assessment results
  • Participant contact lists
  • Any document that could identify someone

Rule 3: Lock Your Laptop

When you leave your laptop (even for 5 minutes):

Mac: Press Control + Command + Q or close the lid
Windows: Press Windows key + L or close the lid

Set automatic lock:

  • Mac: System Preferences → Security & Privacy → Set to lock after 10 minutes
  • Windows: Settings → Accounts → Sign-in options → Set screen timeout to 10 minutes

Why: If your laptop is unlocked at a coffee shop or client site, anyone can see client information.

Rule 4: Don’t Work on Sensitive Information in Public

When in coffee shops, trains, planes, co-working spaces:

  • Don’t open documents with participant names or feedback
  • Don’t have coaching calls where others can hear
  • Don’t leave papers with participant information on tables
  • Be aware of people looking over your shoulder

At client sites:

  • Follow the same rules
  • Don’t leave documents in meeting rooms
  • Log out of client computers when finished

At home: You’re fine to work on sensitive information (it’s private)

Rule 5: Use Your Work Devices, Be Careful with Personal Ones

Your company laptop: Use this for all client work (preferred)

Personal devices:

  • Try to avoid using personal phones/tablets for participant information
  • If you must use WhatsApp for quick coordination: No participant names, just logistics
  • Never forward participant information to personal email

Why: Company devices are easier to manage if something goes wrong (lost/stolen)

Rule 6: Delete Project Information When Done

Within 30 days of project completion:

  1. Delete from your laptop:
    • Coaching notes with participant names
    • Workshop feedback documents
    • Any emails with participant information
  2. Keep on Google Drive (official records):
    • Final reports (if needed for Association records)
    • Contracts and invoices
    • These are stored securely in our shared workspace
  3. What you can keep forever:
    • Anonymous insights (remove all names first)
    • General learnings from the project
    • Your own professional development notes (without client specifics)

How to delete properly:

  • Empty your Trash/Recycle Bin after deleting files
  • Delete emails from Trash folder too

Rule 7: Keep Your Laptop Updated

Every month (or when prompted):

  • Install system updates for your Mac or Windows computer
  • Update Microsoft Office when prompted
  • Update your web browser (Chrome, Safari, Edge)

Why: Updates fix security problems. This takes 10-15 minutes per month and keeps you safe.

  1. What to Do If Something Goes Wrong

If any of these happen, contact [email protected] within 24 hours:

  • Lost or stolen laptop/phone with client information
  • Accidentally sent participant information to wrong person
  • Accidentally shared document with wrong people
  • Client information was accessed by someone unauthorized
  • Suspicious emails that might be phishing attempts
  • Any other situation where client information might be at risk

Don’t panic. These things happen. We need to know quickly so we can:

  1. Notify the client
  2. Take steps to minimize problems
  3. Learn how to prevent it next time

What happens next:

  • We’ll help you figure out what to do
  • We’ll notify the client if needed
  • No blame, just learning
  1. Annual Security Check

Once per year (around January):

  • Make sure you’ve deleted old project information (Rule 6)
  • Verify your laptop lock is set to 10 minutes (Rule 3)
  • Update your laptop fully (Rule 7)
  • Confirm you still have a secure email account (Rule 1)

You’ll receive a reminder email from [email protected].

  1. Getting Help

Questions about this policy? [email protected]

Common questions:

Q: I’m not technical. Can I still follow this?
A: Yes! These are simple steps. If you can lock your laptop and password-protect a Word document, you’re good. If you need help, just ask.

Q: What if I already sent participant info by email before reading this?
A: Going forward, use the secure methods. You’re not in trouble for past practices.

Q: Can I use WhatsApp for client project coordination?
A: Yes, for logistics (meeting times, locations, general updates). But no participant names or feedback.

Q: Do I need antivirus software?
A: Mac computers have built-in protection. Windows 10/11 has Windows Defender built in. This is sufficient. Don’t pay for extra antivirus unless you want to.

Q: What if the client has their own security requirements?
A: Follow their requirements if they’re stricter than ours. Let us know if they create problems.

Q: I work from client sites a lot. Any special rules?
A: Follow their security rules. Don’t connect to their networks with personal devices. Don’t leave documents in their offices.

  1. Summary: The Basics

If you remember nothing else, remember these three things:

  1. Password-protect documents with participant names
  2. Lock your laptop when you leave it
  3. Delete participant information within 30 days of project completion

Do these three things and you’re 90% compliant.

Acknowledgment: I have read and understood the Information Security Policy and agree to follow it when working on Association client projects.

Member Name:           ________________________
Signature:                    ________________________
Date:                           ________________________

 

 

APPENDIX A: Incident Response Procedure

What Counts as a Security Incident?

A security incident is any situation where client information might be accessed by someone who shouldn’t have it, or where we can’t protect it properly.

Common incidents:

  • Lost or stolen laptop, phone, or USB drive with client information
  • Sent email or document to wrong person (contains participant names/feedback)
  • Accidentally shared Google Drive folder with wrong people
  • Left papers with participant information somewhere
  • Laptop left unlocked and someone looked at client files
  • Suspicious email that you clicked on (phishing attempt)
  • Ransomware or malware infection on your laptop
  • Former member still has access to client information they shouldn’t

NOT incidents (don’t worry about these):

  • General spam emails that you didn’t click
  • Slow computer
  • Forgotten password (you can reset it)
  • Can’t access Google Drive (technical problem, not security)

What to Do (Step by Step)

Step 1: Stop and Contain (Immediately)

If laptop/phone is lost or stolen:

  • Change your passwords immediately (email, Google Drive)
  • Contact [email protected] right away
  • If you have Find My Device enabled, use it to lock/wipe device

If you sent something to wrong person:

  • Try to recall the email (Outlook) or delete from Google Drive
  • Contact the person who received it: “Please delete without opening”
  • Don’t send a corrective email explaining what was in it (makes it worse)

If someone accessed your unlocked laptop:

  • Log out immediately
  • Change your passwords
  • Note what was visible on screen when they accessed it

If suspicious email/malware:

  • Disconnect from internet (unplug ethernet, turn off WiFi)
  • Don’t click anything else
  • Take photo of screen with your phone (shows what happened)

Step 2: Report (Within 24 Hours)

Send email to: [email protected]

Subject line: Security Incident – [Your Name] – [Date]

Include in email:

  1. What happened: Brief description (2-3 sentences)
  2. When: Date and approximate time
  3. What information was involved: Which client? Which participants? What type of information?
  4. Who might have accessed it: Wrong person’s name/email, unknown (if stolen), etc.
  5. What you’ve done so far: Steps you took to contain it
  6. Your contact info: Phone number for follow-up

Example:

Subject: Security Incident – Jane Smith – 23 Dec 2025

 

What happened: I left my laptop unlocked in a coffee shop for 5 minutes.

When I returned, someone was looking at my screen.

 

When: Today (Dec 23) around 2pm

 

Information involved: Client ABC project. Had a Word document open with

workshop feedback from 15 participants (names and comments).

 

Who accessed: Unknown person at the coffee shop, only saw them from behind

 

What I’ve done: Closed laptop, changed passwords, left the location

 

Contact: +41 79 123 4567

Step 3: Follow Instructions from Compliance Contact

You’ll hear back within 24 hours. They might ask you to:

  • Provide more details
  • Check what information was actually accessed
  • Contact the client owner for the project
  • Wait while we notify the client

Do not contact the client directly unless instructed. We’ll coordinate this.

Step 4: Learn and Document

After the incident is resolved:

  • Write down what happened and how you’ll prevent it next time
  • Update your practices (e.g., always lock laptop in public places)
  • No blame – we all learn from mistakes

Response Times

From you: Report within 24 hours of discovering the incident

From [email protected]:

  • Urgent incidents (active breach, lost device): Response within 4 hours
  • Other incidents: Response within 24 hours

To client: We’ll notify client within 72 hours if their data was actually compromised (not just at risk)

Who Does What

You (the member):

  • Notice and report the incident
  • Take immediate containment steps
  • Provide information for investigation
  • Implement lessons learned

Compliance Contact:

  • Coordinate response
  • Decide if client notification needed
  • Document the incident
  • Report to Network Development Circle if serious

Client Owner (project lead):

  • Communicate with client if needed
  • Support member through process
  • Help implement preventive measures

Network Development Circle:

  • Review serious incidents
  • Update policies if needed
  • Decide on additional training

Prevention Checklist

Most incidents are preventable. Quick monthly check:

  • Laptop locks automatically after 10 minutes
  • I lock my laptop every time I leave it
  • I password-protect documents with participant information
  • I don’t work on sensitive information in public places
  • I delete old project information within 30 days
  • My laptop software is updated
  • I don’t click on suspicious emails

 

 

APPENDIX B: Password Requirements Guide

Why Passwords Matter

Passwords protect client information on your laptop, documents, and online accounts. Weak passwords are easy to guess or crack.

Password Requirements

For all work-related accounts and documents:

Minimum requirements:

  • At least 8 characters long
  • Mix of uppercase and lowercase letters (Example: Mix not mix)
  • At least one number (0-9)
  • Consider adding a symbol (!@#$%^&*) for extra security

Examples:

  • ✅ Coach2025! (8 characters, upper/lower, number, symbol)
  • ✅ Enablers#March (14 characters, upper/lower, symbol)
  • ✅ MyLaptop99 (10 characters, upper/lower, number)
  • ❌ password (too weak, common word)
  • ❌ 12345678 (too weak, just numbers)
  • ❌ enablers (too weak, no variety)

Creating Strong Passwords

Method 1: Passphrase Use a phrase you’ll remember with substitutions:

  • “I love coaching in 2025” → ILoveCoaching2025!
  • “Coffee and meetings” → Coffee&Meetings24

Method 2: First Letters Take first letters from a sentence:

  • “My daughter was born in March 1995” → MdwbiM1995!
  • “Enablers helps leaders achieve extraordinary” → Ehlae#2025

Method 3: Word + Number + Symbol Combine a word with numbers and symbols:

  • Butterfly#42
  • Mountain$2024
  • Ocean!Wave99

What NOT to Do

Never use:

  • Your name or company name alone (JohnSmith, Enablers)
  • Common words alone (password, admin, welcome)
  • Sequential numbers (12345678, 11111111)
  • Your birthday (19851103)
  • Same password for everything (if one is compromised, all are)
  • Passwords written on sticky notes on your laptop

Password Management

For your laptop:

  • Mac: Set in System Preferences → Users & Groups
  • Windows: Set in Settings → Accounts → Sign-in options
  • Change at least once per year

For password-protected documents:

  • Use different password than your laptop
  • Share password separately from document (phone call, separate message)
  • Write it down temporarily if needed, but store securely
  • Delete the written password after recipient confirms receipt

For Google Workspace / email accounts:

  • Should already meet requirements (Google enforces this)
  • Enable 2-factor authentication if available (extra security)
  • Never share your email password with anyone

Password Reset Process

If you forget a password:

Laptop password:

  • Mac: Use your Apple ID to reset
  • Windows: Use your Microsoft account or local reset options
  • Contact IT support if needed (your own, not Enablers)

Google Workspace:

  • Use Google’s password recovery
  • Contact [email protected] if you have an official Enablers email

Password-protected documents:

  • If you created it: No recovery possible, file is lost
  • If someone sent it to you: Ask them for the password again
  • This is why we keep originals on Google Drive (no password needed)

Annual Password Update

Every January (or when you join):

  • Change your laptop password
  • Review which documents you have password-protected
  • Delete passwords for old projects (documents should be deleted anyway)
  • Update this checklist

Quick Reference Card

Cut this out and keep it visible (but not passwords themselves!):

PASSWORD CHECKLIST

□ At least 8 characters

□ Uppercase AND lowercase

□ At least one number

□ Consider a symbol

□ Not a common word

□ Not your name/birthday

 

NEED HELP?

[email protected]

 

 

APPENDIX C: Approved Tools List

Purpose

This list specifies which tools members should use for client work. Using approved tools ensures we maintain security standards and can support you if problems arise.

All tools listed here meet our security requirements. If you want to use something not on this list, contact [email protected] first.

Email (Client Communication)

APPROVED

Google Workspace (Enablers accounts)

  • Example: [email protected]
  • Best choice – official Enablers email
  • Automatically secure, encrypted in transit
  • Backed up by Enablers

Gmail (Personal accounts)

  • Example: [email protected]
  • Acceptable for members without official Enablers email
  • Automatically encrypted in transit
  • Use only if you don’t have Enablers account

Microsoft Outlook / Microsoft 365

  • Example: [email protected]
  • Acceptable if this is your company email
  • Automatically encrypted in transit

ProtonMail

  • Extra secure option if you prefer
  • End-to-end encryption available

NOT APPROVED

  • Free email services (Yahoo, AOL, Hotmail)
  • Temporary email services
  • Unencrypted email providers

Rule: Use your Enablers email if you have one. Otherwise, use Gmail or your company’s Outlook email.

File Storage & Sharing

APPROVED

Google Drive (Primary)

  • Use for: All official Association documents, project files, contracts
  • Why: This is our shared workspace, access controlled, backed up
  • Security: Password-protected sharing available, access logs
  • Location: Centrally managed by Enablers Association

Dropbox

  • Use for: Large file transfers when needed
  • Why: Reliable, secure, widely used
  • Security: Encryption in transit and at rest
  • Note: Use for file transfer, not long-term storage

⚠️ USE WITH CAUTION

WeTransfer

  • Use for: Non-sensitive files only (marketing materials, public documents)
  • DO NOT use for: Participant information, coaching notes, confidential client data
  • Why cautious: Files are not encrypted, links can be shared, limited control

NOT APPROVED FOR CLIENT WORK

  • Personal USB drives (too easy to lose)
  • Personal email attachments for large files
  • Cloud services not listed here (Mega, MediaFire, etc.)

Rule:

  • Participant information: Google Drive only
  • Large non-sensitive files: Google Drive or Dropbox
  • Never: WeTransfer for anything with participant names

Document Creation

APPROVED

Microsoft Office (Word, Excel, PowerPoint)

  • Desktop version or Office 365
  • Can password-protect documents (required for participant information)
  • Most commonly used, compatible with clients

Google Docs, Sheets, Slides

  • Part of Google Workspace
  • Good for collaboration
  • Automatically saved to Google Drive
  • Note: Download as Word/Excel and password-protect if sharing participant information

⚠️ ACCEPTABLE WITH CONDITIONS

Apple Pages, Numbers, Keynote

  • Acceptable if you’re Mac-only
  • Export to PDF or Office format when sharing with clients
  • Cannot password-protect as easily (convert to Office format first)

Communication & Collaboration

APPROVED

Email (see Email section above)

  • Primary communication method
  • Use for all official client communication

WhatsApp

  • Use for: Quick coordination, logistics, scheduling
  • Examples: “Meeting starts in 10 min”, “Running 5 min late”, “Room changed to B3”
  • DO NOT use for: Participant names, feedback, sensitive information
  • Why allowed: Encrypted, widely used, convenient for quick coordination

Phone Calls

  • Always acceptable
  • Preferred for sensitive discussions
  • Use for sharing passwords (never write passwords in text/email)

⚠️ USE WITH CAUTION

Zoom / Microsoft Teams / Google Meet

  • Acceptable for virtual coaching sessions
  • Turn on waiting room
  • Don’t record without participant consent
  • Use secure meeting links (not generic open links)

NOT APPROVED FOR CLIENT INFORMATION

  • Public social media (LinkedIn, Twitter, Facebook)
  • Open Slack channels
  • Any unencrypted messaging

Rule: Email for official communication. WhatsApp for logistics only (no participant info). Phone calls for sensitive topics.

Accounting & Finance

Outsourced Accountant

  • All financial matters handled by professional accountant
  • Don’t store financial information on your laptop
  • Send receipts/invoices through secure method (email to accountant’s official email)

File Backup

APPROVED

Google Drive

  • Automatic backup for files stored there
  • Managed by Enablers Association

Time Machine (Mac) / Windows Backup

  • Acceptable for backing up your laptop
  • Use external hard drive, keep it secure (locked at home)
  • Remember: If your backup has client information, it must be encrypted

NOT APPROVED

  • Cloud services not listed (iCloud, OneDrive personal, etc.)
  • USB drives carried around (too easy to lose)

Tools We Don’t Use (But Clients Might)

If a client requires you to use their tools:

  • Follow their security requirements
  • Use only for that specific client project
  • Don’t store their data on your personal laptop (use their systems)
  • Ask client IT for setup help

Common client tools:

  • SharePoint (Microsoft)
  • OneDrive (Microsoft)
  • Slack (workspace communication)
  • Client-specific portals

Requesting New Tools

Want to use something not on this list?

Email [email protected] with:

  1. What tool you want to use
  2. Why you need it
  3. What you’ll use it for
  4. Security features it has

We’ll review and update this list if appropriate.

Annual Review

This list is reviewed annually (January) and updated as needed. You’ll be notified of changes.

Quick Reference

DAILY USE:

  • ✅ Email: Enablers email or Gmail
  • ✅ Files: Google Drive
  • ✅ Documents: MS Office or Google Docs
  • ✅ Quick messages: WhatsApp (logistics only)

PARTICIPANT INFORMATION:

  • ✅ Google Drive only
  • ✅ Password-protected Office documents
  • ❌ Never WeTransfer
  • ❌ Never WhatsApp

Questions? [email protected]