policy SME

Clear Desk and Clear Screen Policy - SME

Ensure confidential information stays protected with a practical Clear Desk and Screen Policy tailored for SMEs and ISO/IEC 27001 compliance.

Overview

This Clear Desk and Screen Policy establishes practical, enforceable guidelines for SMEs to protect sensitive information in all workspaces and digital environments, aligning with ISO/IEC 27001 and GDPR requirements. It details responsibilities, physical and technical control rules, compliance checks, and incident procedures, all tailored for organizations without formal IT departments.

Protect Sensitive Data Anywhere

Enforce screen locking and secure workspace practices for both physical offices and remote work.

Easy SME Implementation

Designed for organizations without dedicated IT teams, overseen by a General Manager.

Meet Audit & Certification Needs

Helps satisfy ISO/IEC 27001:2022 and GDPR requirements through clear procedures.

Read Full Overview
The Clear Desk and Screen Policy (P10S) is a crucial operational guideline designed for small and medium-sized enterprises (SMEs) that need to ensure data confidentiality and maintain regulatory compliance, including ISO/IEC 27001:2022. Because it is an SME policy, as indicated by the 'S' in its document number and the assignment of the General Manager as the policy owner, it is specially adapted for organizations that might lack dedicated IT or security management teams. The policy’s core aim is to clearly outline practical, enforceable behaviors and technical controls that guard sensitive information, regardless of work location or organizational resources. At its foundation, this policy mandates that all employees, contractors, and temporary staff safeguard physical and digital workspaces by ensuring no confidential information remains visible, unattended, or improperly secured. The scope broadly covers physical offices, shared workspaces, coworking environments, and remote/home-based work settings. It applies to all paper and digital assets, such as documents, printouts, hand-written notes, removable media, computers, and mobile devices. By including such breadth, the policy addresses modern working patterns while maintaining a sharp focus on risk reduction. Roles and responsibilities are clearly streamlined for an SME context. The General Manager is entrusted with full ownership, responsible for policy communication, training, approval of exceptions, and execution of quarterly workspace compliance checks. Additional duties can be delegated to designated staff, such as the setup of screen lock settings or distribution of physical storage aids. However, the design ensures effectiveness even without formal IT or compliance departments. All personnel are held accountable to the simple but essential requirements: locking screens when unattended, securing all confidential materials, avoiding reliance solely on digital controls, and reporting potential risks or non-compliance. Policy objectives are tightly linked to both operational risk reduction and regulatory obligations. Clear, practical rules establish a baseline: automatic workstation lock after five minutes, secure storage of documents at day’s end, immediate retrieval of sensitive printouts, and signage reinforcing awareness. The General Manager is also responsible for onboarding and awareness training, logging of compliance activities, and escalations in the event of incident or breach. Importantly, the policy’s design supports a culture of vigilance and accountability, focusing on achievable controls within the capabilities of a resource-constrained SME, while maintaining alignments, such as Annex A Control 7.7 of ISO/IEC 27001 and GDPR Article 32. The overall structure equips SMEs to demonstrate due diligence during audits and to effectively mitigate physical and information risks from internal mishandling or external threats such as visitors or contractors. Realistic exception processes, tailored controls for remote workers, and defined disciplinary responses ensure both clarity and credibility. The policy includes linkage with other critical policies (e.g., Information Security Awareness, Access Control, Incident Response), forming part of a concise, coherent cyber hygiene framework ideal for smaller organizations.

Policy Diagram

Clear Desk and Screen Policy diagram showing responsibilities for General Manager, staff, and IT to enforce physical and digital workspace security through checks, locked storage, and training.

Click diagram to view full size

What's Inside

Scope and Rules of Engagement

Roles and Responsibilities for SME

Clear Desk and Screen Enforcement

Technical and Physical Control Requirements

Compliance and Incident Response

Audit and Monitoring Processes

Framework Compliance

🛡️ Supported Standards & Frameworks

This product is aligned with the following compliance frameworks, with detailed clause and control mappings.

Framework Covered Clauses / Controls
ISO/IEC 27001:2022
ISO/IEC 27002:2022
7.7
NIST SP 800-53 Rev.5
EU NIS2
EU DORA
COBIT 2019
EU GDPR
Article 32

Related Policies

Governance Roles And Responsibilities Policy-SME

Clarifies the GM’s authority to enforce and audit physical and digital workspace behavior.

Access Control Policy-SME

Supports technical implementation of screen lock and secure workstation login practices.

Information Security Awareness And Training Policy-SME

Reinforces the behavioral training needed for policy compliance.

Data Protection And Privacy Policy-SME

Defines obligations for handling and safeguarding personal and sensitive data in compliance with GDPR.

Incident Response Policy-SME

Provides the escalation and response framework if a violation results in data exposure or breach.

About Clarysec Policies - Clear Desk and Clear Screen Policy - SME

Generic security policies are often built for large corporations, leaving small businesses struggling to apply complex rules and undefined roles. This policy is different. Our SME policies are designed from the ground up for practical implementation in organizations without dedicated security teams. We assign responsibilities to the roles you actually have, like the General Manager and your IT Provider, not an army of specialists you don't. Every requirement is broken down into a uniquely numbered clause (e.g., 5.2.1, 5.2.2). This turns the policy into a clear, step-by-step checklist, making it easy to implement, audit, and customize without rewriting entire sections.

Plain-Language Staff Rules

All personnel, regardless of technical skill, get simple, actionable instructions for secure workspace habits.

Quarterly Compliance Checks

Policy requires practical spot-checks and record keeping, supporting continuous SME-level assurance.

Frequently Asked Questions

Built for Leaders, By Leaders

This policy was authored by a security leader with 25+ years of experience deploying and auditing ISMS frameworks for global enterprises. It's designed not just to be a document, but a defensible framework that stands up to auditor scrutiny.

Authored by an expert holding:

MSc Cyber Security, Royal Holloway UoL CISM CISA ISO 27001:2022 Lead Auditor & Implementer CEH

Coverage & Topics

🏢 Target Departments

IT Security Compliance Operations Governance

🏷️ Topic Coverage

Access Control Documented Information Policy Management Security Awareness and Training Physical Security
€29

One-time purchase

Instant download
Lifetime updates
Clear Desk and Clear Screen Policy - SME

Product Details

Type: policy
Category: SME
Standards: 7