EMPLOYEE SECURITY AWARENESS TRAINING ACKNOWLEDGMENT
[ORGANIZATION NAME]
PART A: TRAINING ACKNOWLEDGMENT FORM
Employee Information
| Field | Information |
|---|---|
| Employee Name | |
| Employee ID | |
| Department | |
| Job Title | |
| Manager Name | |
| Hire Date | |
| Training Date |
Training Details
| Field | Information |
|---|---|
| Training Title | [Security Awareness Training / Annual Refresher / Other] |
| Training Provider | [Internal / Third-Party Provider Name] |
| Training Duration | [Hours/Minutes] |
| Training Method | ☐ In-Person ☐ Online ☐ Hybrid |
| Training Version/Date |
PART B: TRAINING TOPICS COVERED
By signing this acknowledgment, I confirm that I have completed training on the following topics:
Information Security Fundamentals
☐ Information security policies and procedures
☐ Confidentiality, integrity, and availability concepts
☐ Data classification and handling requirements
☐ Acceptable use of company systems and resources
☐ Personal responsibility for security
Password and Authentication Security
☐ Creating strong passwords
☐ Password management best practices
☐ Multi-factor authentication usage
☐ Account security and protection
☐ Reporting compromised credentials
Phishing and Social Engineering
☐ Recognizing phishing emails and messages
☐ Identifying social engineering tactics
☐ Reporting suspicious communications
☐ Verifying requests for sensitive information
☐ Business email compromise awareness
Malware and Ransomware Prevention
☐ Types of malware and their impacts
☐ Safe browsing practices
☐ Software download policies
☐ USB and removable media security
☐ Ransomware recognition and prevention
Data Protection and Privacy
☐ Protecting sensitive and personal data
☐ Data handling and storage requirements
☐ Data sharing restrictions
☐ Privacy regulations overview (CCPA, GDPR, etc.)
☐ Customer and employee data protection
Physical Security
☐ Badge and access control procedures
☐ Visitor management
☐ Clean desk policy
☐ Secure document disposal
☐ Reporting physical security concerns
Mobile and Remote Work Security
☐ Securing mobile devices
☐ Remote work security requirements
☐ Public Wi-Fi risks and VPN usage
☐ Home network security
☐ Video conferencing security
Incident Reporting
☐ What constitutes a security incident
☐ How to report security incidents
☐ Incident reporting contacts and procedures
☐ Importance of timely reporting
☐ Protection from retaliation
Cloud and Third-Party Security
☐ Approved cloud services and applications
☐ Risks of unauthorized cloud usage (Shadow IT)
☐ Third-party security considerations
☐ Data sharing with external parties
[Additional Topics as Applicable]
☐ Industry-specific requirements (HIPAA, PCI-DSS, etc.)
☐ Insider threat awareness
☐ Artificial intelligence security risks
☐ Other: _______________________
PART C: KNOWLEDGE VERIFICATION
Assessment Results (if applicable)
| Field | Information |
|---|---|
| Assessment Score | _____ / _____ (____%) |
| Passing Score | _____% |
| Pass/Fail | ☐ Pass ☐ Fail |
| Retake Required | ☐ Yes ☐ No |
PART D: POLICY ACKNOWLEDGMENTS
By signing below, I acknowledge and agree to the following:
Understanding of Responsibilities
☐ I understand that I am responsible for protecting [ORGANIZATION NAME]'s information assets and complying with all security policies.
☐ I understand that security is everyone's responsibility and that my actions impact the organization's overall security posture.
☐ I understand the importance of reporting security incidents, suspicious activities, and policy violations promptly.
Compliance Commitment
☐ I have read and understand [ORGANIZATION NAME]'s Information Security Policy and related security policies.
☐ I agree to comply with all security policies, procedures, and guidelines.
☐ I understand that failure to comply with security policies may result in disciplinary action, up to and including termination of employment.
Confidentiality
☐ I agree to protect confidential and sensitive information entrusted to me.
☐ I will not disclose confidential information to unauthorized individuals.
☐ I understand that my confidentiality obligations continue after my employment ends.
Acceptable Use
☐ I agree to use [ORGANIZATION NAME]'s systems and resources only for authorized business purposes.
☐ I understand that my use of company systems may be monitored.
☐ I will not use company resources for illegal, unethical, or unauthorized purposes.
Incident Reporting
☐ I agree to report suspected security incidents immediately to [SECURITY TEAM/HELP DESK].
☐ I understand that timely reporting is critical to minimizing potential damage.
☐ I understand that I will not face retaliation for good-faith reporting of security concerns.
Ongoing Learning
☐ I understand that security awareness is an ongoing requirement.
☐ I agree to complete annual security awareness refresher training.
☐ I agree to participate in security exercises such as phishing simulations.
PART E: EMPLOYEE ACKNOWLEDGMENT
Acknowledgment Statement
I, the undersigned, hereby acknowledge that:
-
I have completed the security awareness training identified above.
-
I understand the security policies, procedures, and best practices covered in the training.
-
I understand my responsibilities for protecting [ORGANIZATION NAME]'s information assets.
-
I agree to comply with all security policies and report any security incidents or concerns.
-
I understand that violation of security policies may result in disciplinary action.
-
I have had the opportunity to ask questions and have received satisfactory answers.
Employee Signature
Printed Name: _______________________________
Signature: _______________________________
Date: _______________________________
Email: _______________________________
PART F: MANAGER ACKNOWLEDGMENT (if applicable)
Manager Verification
☐ I verify that the above-named employee has completed the required security awareness training.
☐ I will ensure this employee completes annual refresher training as required.
☐ I will address any security-related concerns or questions this employee may have.
Manager Signature
Printed Name: _______________________________
Title: _______________________________
Signature: _______________________________
Date: _______________________________
PART G: TRAINING ADMINISTRATION
Training Record
| Field | Information |
|---|---|
| Training Coordinator | |
| Learning Management System ID | |
| Certificate Number (if applicable) | |
| Completion Verified By | |
| Date Verified |
Record Retention
This training acknowledgment will be retained in accordance with [ORGANIZATION NAME]'s record retention policy.
Retention Period: Duration of employment plus [3] years
Storage Location: [HR Records / LMS / Security Records]
APPENDIX A: KEY SECURITY CONTACTS
Report Security Incidents To:
| Contact | Information |
|---|---|
| Security Hotline | [PHONE NUMBER] |
| Security Email | [EMAIL ADDRESS] |
| Help Desk | [PHONE NUMBER / EMAIL] |
| CISO Office | [CONTACT INFO] |
Additional Resources:
| Resource | Location |
|---|---|
| Security Policies | [INTRANET URL] |
| Security Awareness Portal | [URL] |
| Report Phishing | [EMAIL/BUTTON] |
| Password Reset | [URL/PROCEDURE] |
APPENDIX B: QUICK REFERENCE SECURITY TIPS
Phishing Prevention
- Verify sender email addresses carefully
- Hover over links before clicking
- Be suspicious of urgency or pressure
- When in doubt, report and verify
- Never provide credentials via email
Password Security
- Use unique passwords for each account
- Minimum 12 characters with complexity
- Use a password manager
- Never share passwords
- Enable MFA wherever possible
Data Protection
- Lock your computer when away (Win+L or Ctrl+Cmd+Q)
- Don't leave sensitive documents unattended
- Shred sensitive paper documents
- Don't send sensitive data via unencrypted email
- Know your data classification levels
Incident Reporting
When to report:
- Suspicious emails or messages
- Lost or stolen devices
- Unexpected system behavior
- Unauthorized access attempts
- Data exposure concerns
How to report:
- Call Security Hotline: [NUMBER]
- Email: [SECURITY EMAIL]
- Use the "Report Phishing" button
- Contact your manager
DOCUMENT CONTROL
| Version | Date | Author | Changes |
|---|---|---|---|
| 1.0 | [DATE] | [NAME] | Initial version |
SUPPLEMENTAL FORMS
Annual Refresher Training Acknowledgment
For employees completing annual refresher training:
I, _________________________________, acknowledge that I have completed the annual security awareness refresher training on [DATE].
I reaffirm my commitment to complying with [ORGANIZATION NAME]'s security policies and protecting company information assets.
Signature: _______________________________
Date: _______________________________
New Hire Orientation Security Briefing
For new employees:
As part of my new hire orientation, I have received a security briefing covering:
☐ Security policy overview
☐ Account setup and password requirements
☐ Badge and physical access procedures
☐ Incident reporting procedures
☐ Key security contacts
I understand that I must complete the full security awareness training within [30] days of my start date.
Employee Signature: _______________________________
Date: _______________________________
HR Representative: _______________________________
Specialized Role Training Acknowledgment
For employees in security-sensitive roles:
In addition to general security awareness training, I have completed specialized training for my role:
☐ IT Administrator Security Training
☐ Developer Secure Coding Training
☐ HR Data Protection Training
☐ Finance/Accounting Security Training
☐ Executive Security Briefing
☐ Other: _______________________________
Training Date: _______________________________
Employee Signature: _______________________________
Date: _______________________________
This form is the property of [ORGANIZATION NAME]. Completed forms should be submitted to [HR/SECURITY/LMS] and retained according to the organization's record retention policy.
Do more with Ezel
This free template is just the beginning. See how Ezel helps legal teams draft, research, and collaborate faster.
AI that drafts while you watch
Tell the AI what you need and watch your document transform in real-time. No more copy-pasting between tools or manually formatting changes.
- Natural language commands: "Add a force majeure clause"
- Context-aware suggestions based on document type
- Real-time streaming shows edits as they happen
- Milestone tracking and version comparison
Research and draft in one conversation
Ask questions, attach documents, and get answers grounded in case law. Link chats to matters so the AI remembers your context.
- Pull statutes, case law, and secondary sources
- Attach and analyze contracts mid-conversation
- Link chats to matters for automatic context
- Your data never trains AI models
Search like you think
Describe your legal question in plain English. Filter by jurisdiction, date, and court level. Read full opinions without leaving Ezel.
- All 50 states plus federal courts
- Natural language queries - no boolean syntax
- Citation analysis and network exploration
- Copy quotes with automatic citation generation
Ready to transform your legal workflow?
Join legal teams using Ezel to draft documents, research case law, and organize matters — all in one workspace.