P2 - Acceptable Use Policy
P2 - Acceptable Use Policy
Contents
Purpose of This Document ..................................................................................................... 1
Scope .................................................................................................................................... 2
Responsibilities ..................................................................................................................... 2
Exceptions............................................................................................................................. 2
Computer Access Control ...................................................................................................... 2
Internet & Email Use .............................................................................................................. 2
Clear Desk & Screen .............................................................................................................. 3
Remote Working .................................................................................................................... 3
Mobile Storage Devices .......................................................................................................... 3
Transferring Data ................................................................................................................... 3
Software ................................................................................................................................ 3
Malware ................................................................................................................................ 3
Telephony (Voice) Equipment ................................................................................................. 4
Actions upon Leaving the [Company Name] ............................................................................ 4
Monitoring and Filtering .......................................................................................................... 4
Page 1 of 4
Acceptable Use Policy
Scope
This Acceptable Use Policy applies to;
Responsibilities
Line Managers
• Line Managers must ensure that individuals are given clear direction on the extent and
limits of their authority concerning IT systems and data.
• Ensure staff, temporary employees, contractors and secondees will comply with this
policy
• Recover [Company Name] devices from departing staff or those not needing them;
• Grant access to data and systems based on genuine need;
• Revoke access for departing staff or those not needing it;
• Clarify individual authorities regarding IT and data
All Staff
Exceptions
Remote Working
• Safeguard [Company Name] devices in public and during travel;
• Don't share devices with non-[Company Name] employees;
• Avoid unsecured and unfamiliar wi-fi;
• Protect mobile devices with strong passwords and encryption.
• Particular care should be taken with mobile devices such as laptops, mobile phones,
smartphones, and tablets. They must be protected at least by a password/passphrase
in line with the Password Guidelines or a PIN and, where available, encryption.
Transferring Data
• Ensure confidential data is always encrypted and that the decryption key or password is
sent through a separate form of communication.
Software
• Follow software licensing agreements;
• Employees are not permitted to install any software on systems without prior approval
from the IT Department.
• Maintain proof of ownership for [Company Name] data in third-party software.
Malware
• Don't bypass the security measures designed to protect our organisation, including;
o Anti-Virus Software - All PCs have antivirus software installed to detect and
remove viruses automatically.
o Mimecast – This scans incoming and outgoing emails for potentially harmful
threats.
Page 3 of 4
Acceptable Use Policy
Page 4 of 4