Security policy

If you are interested in other policy documents not included on this page, or the Conclusion risk methodology, please fill out the form and specify why you want those documents in the subject. Your data will only be used to get into contact about the Conclusion security policy.

Note that Conclusion has classified its policy as public information. Copying from the policy documents is allowed. The full (unbranded) document in Word format is available as well.

Documents in NL

Download

Beveiligingsbeleid ecosysteem

Download

Richtlijn data classificatie

Download

Richtlijn leveranciers en contractmanagement

Note that Conclusion has classified its policy as public information. Copying from the policy documents is allowed. The full (unbranded) document in Word format is available as well.

Contact form