Skip to content

Policy

Acceptable Use Policy

What staff can and can't do with the company's computers, accounts, and internet connection.

Every employee needs to know what they can and cannot do with company IT. This one-pager covers the basics in plain English — not legalese. Read out at induction; reference at re-induction.

How to use this: The bracketed items like [Company Name] are placeholders — replace them with your own details. Edit the wording to suit your business. This is a starter, not legal advice.

Purpose

[Company Name] provides computers, accounts, and internet access to enable work. This policy sets out what acceptable use looks like.

What you can do

  • Use company kit and accounts for work tasks.
  • Some personal use is fine — e.g. checking train times, ordering lunch — provided it doesn't interfere with work or break this policy.
  • Take work calls and emails on company devices outside hours, if that suits you.

What you must not do

  • Access, store, or share material that is illegal, discriminatory, harassing, or grossly inappropriate.
  • Install software that hasn't been approved.
  • Use company kit for a side business or competing activity.
  • Share your password with anyone, ever — including your manager or IT support.
  • Connect personal USB drives or hardware to company devices without approval.
  • Bypass security controls (VPN, MFA, web filtering, EDR) for any reason.
  • Forward work email to a personal address.

If you're not sure

Ask [Named Manager]. Better to ask than to guess.

Monitoring

Company devices, accounts, and traffic may be monitored where there is a legitimate business reason, in line with the Data Protection Act 2018 and our staff privacy notice. Personal communications are not routinely read.

Reporting problems

Tell [Named Manager] immediately if you:

  • Click a suspicious link or attachment.
  • Lose a phone or laptop.
  • Notice something on your screen that you didn't do.
  • Get a phone call asking for credentials or payment changes.

You will not be blamed for honest mistakes promptly reported.

Breach

Significant or wilful breaches may result in disciplinary action up to and including dismissal.

Review

Reviewed annually. Last reviewed: [date].

Tips for adoption

  • Get a signed acknowledgement at induction and at annual refresh.
  • Reference the Password Policy and AI Policy for the detail.
  • Test understanding occasionally — a 2-minute quiz is plenty.