Acceptable Use Policy
1. Purpose
The purpose of this Acceptable Use Policy is to establish guidelines for the appropriate use of
the Company’s information systems, including networks, devices, software, and data. This
policy aims to protect the integrity, security, and availability of the Company’s assets while
ensuring compliance with legal and regulatory requirements.
2. Scope
This policy applies to all employees, contractors, and any other individuals who access or use
the Company’s information systems.
3. Acceptable Use
Users of the Company’s information systems must adhere to the following guidelines:
● Use Company-provided technology, networks, and data solely for business purposes.
● Protect sensitive data and maintain confidentiality as per the Company’s security
policies.
● Use the Company’s single sign-on account where available and strong passwords and
multi-factor authentication (MFA) where SSO is not available.
● Ensure software and systems are updated as per IT security guidelines.
4. Prohibited Activities
The following activities are strictly prohibited:
● Unauthorized access to or use of systems, data, or networks.
● Sharing login credentials or allowing unauthorized individuals to access Company
resources.
● Using unapproved software, whether downloaded or cloud-based.
● Engaging in any illegal, unethical, or disruptive activities using Company assets.
● Using Company resources for personal financial gain, political activity, or harassment.
5. Email and Internet Usage
● Company email and internet access should be used primarily for business purposes.
● Users must avoid accessing, downloading, or sharing inappropriate, offensive, or illegal
content.
● Phishing, spam, and other suspicious emails must be reported to IT security.
6. Data Protection and Privacy
● Users must handle personal and sensitive data in accordance with Company security
policies and applicable regulations.
● Data must not be stored on unauthorized personal devices or shared outside the
Company without proper authorization.
● Lost or stolen devices must be reported immediately to IT security.
7. Monitoring and Enforcement
● The Company reserves the right to review network and system usage for security
purposes and to ensure compliance with this policy.
● Violations may result in disciplinary action, including termination and potential legal
consequences.
● Any suspected security breaches or policy violations must be reported to the IT
department immediately.
8. Policy Review and Updates
This policy will be reviewed and updated periodically to align with evolving security threats and
business needs. Users are responsible for staying informed of any updates.