Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Acceptable Use Policy
I need an Acceptable Use Policy for a company that outlines the permissible and prohibited uses of our IT resources, ensuring compliance with Swiss data protection laws and promoting a secure and respectful digital environment. The policy should include guidelines on internet usage, email communication, and data handling, with clear consequences for violations.
What is an Acceptable Use Policy?
An Acceptable Use Policy sets clear rules for how employees and users can interact with an organization's technology, data, and network resources. In Swiss organizations, these policies help meet data protection requirements under the Federal Act on Data Protection (FADP) while protecting company assets from misuse.
The policy typically covers proper use of email, internet access, software installations, and data handling protocols. It creates accountability by spelling out consequences for violations and helps Swiss companies defend against cyber threats while maintaining compliance with cantonal privacy laws. Many organizations require employees to sign this policy as part of their employment terms.
When should you use an Acceptable Use Policy?
Use an Acceptable Use Policy when introducing new technology systems or onboarding employees in Swiss organizations. It's especially important when rolling out remote work programs, implementing bring-your-own-device policies, or giving staff access to sensitive data covered by the FADP.
The policy becomes essential during digital transformation projects, after security incidents, or when expanding operations across cantonal borders. Swiss companies facing increased cybersecurity risks or handling personal data from EU customers need this policy to demonstrate compliance with both local and international privacy requirements. It helps prevent costly data breaches and builds trust with stakeholders.
What are the different types of Acceptable Use Policy?
- Basic Network Policy: Covers fundamental IT system usage, email guidelines, and internet access rules - ideal for small Swiss businesses
- Enterprise Security AUP: Comprehensive version including data protection protocols, BYOD rules, and FADP compliance measures for larger organizations
- Industry-Specific AUP: Tailored versions for sectors like banking, healthcare, or education, incorporating relevant cantonal regulations
- Remote Work AUP: Focused on secure remote access, cloud services usage, and cross-border data handling requirements
- GDPR-Aligned AUP: Enhanced version meeting both Swiss and EU data protection standards for companies operating internationally
Who should typically use an Acceptable Use Policy?
- IT Departments: Draft and maintain the Acceptable Use Policy, monitor compliance, and implement technical controls
- Legal Teams: Review policy alignment with FADP requirements and cantonal regulations, update terms as needed
- Human Resources: Distribute policies, collect employee signatures, and handle violation procedures
- Employees: Must read, understand, and follow policy guidelines for all company technology use
- External Contractors: Required to comply when accessing company systems or handling organizational data
- Data Protection Officers: Ensure policy meets Swiss privacy standards and governance requirements
How do you write an Acceptable Use Policy?
- System Inventory: List all IT resources, software, and networks the policy needs to cover
- Risk Assessment: Identify potential security threats and data protection requirements under FADP
- User Groups: Map different access levels and permissions for employees, contractors, and guests
- Technical Controls: Document existing security measures and monitoring capabilities
- Compliance Check: Review cantonal privacy laws and industry-specific regulations
- Policy Generation: Use our platform to create a customized, legally-sound Acceptable Use Policy that meets Swiss standards
- Distribution Plan: Prepare training materials and acknowledgment forms for staff
What should be included in an Acceptable Use Policy?
- Purpose Statement: Clear objectives and scope of the policy aligned with Swiss data protection principles
- System Access Rules: Detailed guidelines for proper use of company IT resources and networks
- Data Protection Measures: FADP-compliant procedures for handling personal and sensitive information
- Security Requirements: Password policies, encryption standards, and incident reporting procedures
- Prohibited Activities: Specific examples of unauthorized use and misconduct
- Monitoring Notice: Transparent disclosure of surveillance methods within Swiss privacy limits
- Enforcement Process: Clear consequences for violations and disciplinary procedures
- Acknowledgment Section: User signature block confirming understanding and acceptance
What's the difference between an Acceptable Use Policy and a Cybersecurity Policy?
While both documents focus on IT security, an Acceptable Use Policy differs significantly from a Cybersecurity Policy. The key distinctions lie in their scope, audience, and implementation requirements under Swiss law.
- Primary Focus: Acceptable Use Policies govern day-to-day user behavior and system access, while Cybersecurity Policies outline broader technical security measures and organizational safeguards
- Target Audience: AUPs directly address end users with clear dos and don'ts, whereas Cybersecurity Policies guide IT teams and management on security infrastructure
- Legal Requirements: AUPs need employee acknowledgment to be enforceable under Swiss employment law; Cybersecurity Policies function as internal governance documents
- Compliance Scope: AUPs focus on FADP-compliant user behavior, while Cybersecurity Policies address broader technical compliance standards and incident response protocols
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.