Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Acceptable Use Policy
I need an Acceptable Use Policy for a small business that outlines the appropriate use of company resources, including internet and email, to ensure compliance with legal and ethical standards. The policy should include guidelines for data protection, prohibited activities, and consequences for violations.
What is an Acceptable Use Policy?
An Acceptable Use Policy sets clear rules for how people can use an organization's technology, networks, and digital resources. It protects both employers and staff by spelling out what's considered appropriate use of company systems, from email and internet access to software and devices.
In New Zealand workplaces, these policies help organizations meet their obligations under laws like the Privacy Act 2020 and the Harmful Digital Communications Act. They typically cover data security, personal use limits, prohibited activities, and consequences for breaking the rules. A well-crafted policy gives staff clear guidance while helping businesses prevent misuse and manage cyber risks.
When should you use an Acceptable Use Policy?
Put an Acceptable Use Policy in place when introducing new technology systems, onboarding employees, or updating your digital security measures. It's especially important before rolling out company-wide tools like email, cloud storage, or remote work platforms.
This policy becomes crucial when your organization needs to protect sensitive data, meet Privacy Act requirements, or manage cyber security risks. Many New Zealand businesses implement it during digital transformation projects, after security incidents, or when expanding operations. Having clear rules in place helps prevent misuse, protects company assets, and gives staff confidence about appropriate technology use.
What are the different types of Acceptable Use Policy?
- Acceptable Use Agreement: A comprehensive policy focused on general technology use, covering all company systems and devices. Perfect for small to medium businesses needing broad digital conduct guidelines.
- Email And Internet Usage Policy: A specialized version targeting online communications and web access specifically. Ideal for organizations wanting detailed rules around email etiquette, internet browsing, and online security.
Who should typically use an Acceptable Use Policy?
- IT Managers and System Administrators: Draft technical requirements and monitor compliance with the Acceptable Use Policy across company networks and systems.
- HR Departments: Incorporate the policy into employee handbooks, manage training, and handle violations.
- Employees and Contractors: Must read, understand, and follow the policy's rules when using company technology resources.
- Legal Teams: Review and update policies to ensure alignment with Privacy Act requirements and cyber security regulations.
- Company Directors: Approve policy changes and oversee enforcement to protect organizational assets.
How do you write an Acceptable Use Policy?
- Technology Inventory: List all systems, devices, and digital resources your organization provides to users.
- Risk Assessment: Identify potential security threats and compliance requirements under NZ Privacy Act 2020.
- User Groups: Map out different access levels and permissions for staff, contractors, and guests.
- Current Issues: Document existing technology misuse problems or security incidents to address.
- Policy Generation: Use our platform to create a customized, legally-sound Acceptable Use Policy that covers all requirements.
- Implementation Plan: Prepare training materials and communication strategy for rolling out the policy.
What should be included in an Acceptable Use Policy?
- Scope Statement: Clear definition of covered technology, systems, and users under the policy.
- Acceptable Uses: Specific permitted activities and reasonable personal use guidelines.
- Prohibited Activities: Detailed list of banned behaviors and security breach examples.
- Privacy Compliance: Alignment with Privacy Act 2020 requirements for data handling.
- Monitoring Notice: Disclosure of system monitoring and user activity tracking.
- Enforcement Measures: Consequences for violations and disciplinary procedures.
- Acknowledgment: User agreement section with signature blocks and date fields.
What's the difference between an Acceptable Use Policy and a Cybersecurity Policy?
While both policies deal with digital security, an Acceptable Use Policy differs significantly from a Cybersecurity Policy. Here are the key distinctions:
- Primary Focus: Acceptable Use Policies concentrate on user behavior and appropriate technology use, while Cybersecurity Policies outline technical security measures and system protections.
- Target Audience: AUPs are written for general staff and system users, using plain language about daily technology use. Cybersecurity Policies target IT teams and security personnel with technical requirements.
- Scope of Coverage: AUPs cover permitted and prohibited activities on company systems. Cybersecurity Policies address broader security infrastructure, incident response, and technical safeguards.
- Implementation: AUPs require user acknowledgment and are part of employment agreements. Cybersecurity Policies guide IT operations and security protocols without needing individual sign-off.
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.