Ƶ

Free Acceptable Use Policy Template for New Zealand

Create a bespoke document in minutes, or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your document

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Acceptable Use Policy

I need an Acceptable Use Policy for a small business that outlines the appropriate use of company resources, including internet and email, to ensure compliance with legal and ethical standards. The policy should include guidelines for data protection, prohibited activities, and consequences for violations.

What is an Acceptable Use Policy?

An Acceptable Use Policy sets clear rules for how people can use an organization's technology, networks, and digital resources. It protects both employers and staff by spelling out what's considered appropriate use of company systems, from email and internet access to software and devices.

In New Zealand workplaces, these policies help organizations meet their obligations under laws like the Privacy Act 2020 and the Harmful Digital Communications Act. They typically cover data security, personal use limits, prohibited activities, and consequences for breaking the rules. A well-crafted policy gives staff clear guidance while helping businesses prevent misuse and manage cyber risks.

When should you use an Acceptable Use Policy?

Put an Acceptable Use Policy in place when introducing new technology systems, onboarding employees, or updating your digital security measures. It's especially important before rolling out company-wide tools like email, cloud storage, or remote work platforms.

This policy becomes crucial when your organization needs to protect sensitive data, meet Privacy Act requirements, or manage cyber security risks. Many New Zealand businesses implement it during digital transformation projects, after security incidents, or when expanding operations. Having clear rules in place helps prevent misuse, protects company assets, and gives staff confidence about appropriate technology use.

What are the different types of Acceptable Use Policy?

  • Acceptable Use Agreement: A comprehensive policy focused on general technology use, covering all company systems and devices. Perfect for small to medium businesses needing broad digital conduct guidelines.
  • Email And Internet Usage Policy: A specialized version targeting online communications and web access specifically. Ideal for organizations wanting detailed rules around email etiquette, internet browsing, and online security.

Who should typically use an Acceptable Use Policy?

  • IT Managers and System Administrators: Draft technical requirements and monitor compliance with the Acceptable Use Policy across company networks and systems.
  • HR Departments: Incorporate the policy into employee handbooks, manage training, and handle violations.
  • Employees and Contractors: Must read, understand, and follow the policy's rules when using company technology resources.
  • Legal Teams: Review and update policies to ensure alignment with Privacy Act requirements and cyber security regulations.
  • Company Directors: Approve policy changes and oversee enforcement to protect organizational assets.

How do you write an Acceptable Use Policy?

  • Technology Inventory: List all systems, devices, and digital resources your organization provides to users.
  • Risk Assessment: Identify potential security threats and compliance requirements under NZ Privacy Act 2020.
  • User Groups: Map out different access levels and permissions for staff, contractors, and guests.
  • Current Issues: Document existing technology misuse problems or security incidents to address.
  • Policy Generation: Use our platform to create a customized, legally-sound Acceptable Use Policy that covers all requirements.
  • Implementation Plan: Prepare training materials and communication strategy for rolling out the policy.

What should be included in an Acceptable Use Policy?

  • Scope Statement: Clear definition of covered technology, systems, and users under the policy.
  • Acceptable Uses: Specific permitted activities and reasonable personal use guidelines.
  • Prohibited Activities: Detailed list of banned behaviors and security breach examples.
  • Privacy Compliance: Alignment with Privacy Act 2020 requirements for data handling.
  • Monitoring Notice: Disclosure of system monitoring and user activity tracking.
  • Enforcement Measures: Consequences for violations and disciplinary procedures.
  • Acknowledgment: User agreement section with signature blocks and date fields.

What's the difference between an Acceptable Use Policy and a Cybersecurity Policy?

While both policies deal with digital security, an Acceptable Use Policy differs significantly from a Cybersecurity Policy. Here are the key distinctions:

  • Primary Focus: Acceptable Use Policies concentrate on user behavior and appropriate technology use, while Cybersecurity Policies outline technical security measures and system protections.
  • Target Audience: AUPs are written for general staff and system users, using plain language about daily technology use. Cybersecurity Policies target IT teams and security personnel with technical requirements.
  • Scope of Coverage: AUPs cover permitted and prohibited activities on company systems. Cybersecurity Policies address broader security infrastructure, incident response, and technical safeguards.
  • Implementation: AUPs require user acknowledgment and are part of employment agreements. Cybersecurity Policies guide IT operations and security protocols without needing individual sign-off.

Get our New Zealand-compliant Acceptable Use Policy:

Access for Free Now
*No sign-up required
4.6 / 5
4.8 / 5

Find the exact document you need

Email And Internet Usage Policy

A New Zealand-compliant workplace policy governing email and internet usage, aligned with local privacy and employment laws.

find out more

Acceptable Use Agreement

A New Zealand-compliant agreement defining acceptable use terms for digital services, including user obligations and compliance requirements.

find out more

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

ұԾ’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ұԾ’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.