Acceptable Use Policy

Guidelines for proper use of organizational IT resources and systems.

Version 2.1 Updated: Dec 2025 Download PDF

1. Purpose

This Acceptable Use Policy (AUP) establishes guidelines for the appropriate use of organizational information technology resources. The purpose is to:

  • Protect the organization's IT infrastructure and data
  • Ensure compliance with legal and regulatory requirements
  • Maintain a productive and secure work environment
  • Define user responsibilities and acceptable behaviors

2. Scope

This policy applies to:

Users Covered
  • All employees
  • Contractors and consultants
  • Temporary workers
  • Third-party vendors
Resources Covered
  • Computers and mobile devices
  • Network and internet access
  • Email and communication tools
  • Software and applications

3. Acceptable Use

Authorized Activities
  • Business-related communications
  • Accessing approved applications
  • Professional development resources
  • Limited personal use during breaks
Best Practices
  • Lock workstation when away
  • Use strong, unique passwords
  • Report suspicious activities
  • Keep software updated

4. Prohibited Activities

The following activities are strictly prohibited:
Unauthorized Access

Accessing systems without permission

Malicious Software

Installing unapproved software

Data Exfiltration

Unauthorized data transfer

5. Monitoring & Privacy

The organization reserves the right to monitor all IT resource usage including:

monitoring-scope
� Network traffic and bandwidth usage
� Email content and attachments
� Internet browsing history
� File access and modifications
� Application usage patterns

6. Enforcement & Violations

Violations of this policy may result in disciplinary action:

Level 1

Verbal Warning

Level 2

Written Warning

Level 3

Termination

7. Acknowledgment

By using organizational IT resources, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy.