Acceptably Use Policy

  1. General Use: IT resources are to be used solely for professional purposes, with explicit guidelines on acceptable personal use to prevent abuse.

  2. Prohibited Activities: The policy explicitly bans activities such as unauthorized access to systems, distribution of malicious software, and viewing or sharing offensive content. Regular audits and network monitoring are conducted to detect violations.

  3. Data Security: Users are trained on data handling protocols, including encryption of sensitive files and secure sharing practices. Access to data is restricted based on job roles.

  4. Software and Downloads: Only approved software may be installed on company devices. A whitelist of allowed applications is maintained, and admin rights are restricted to IT staff.

  5. Monitoring and Enforcement: Systematic monitoring of IT resource use is in place, with clear procedures for addressing policy violations. This includes IT team reviews and automated system alerts for suspicious activities.

  6. Consequences of Violation: The policy outlines disciplinary actions for non-compliance, ranging from warnings to termination and legal action, depending on the severity of the breach.

  7. Policy Review and Update: The AUP is reviewed annually or in response to significant IT changes, with updates communicated to all users through mandatory briefings or digital platforms.