A policy that defines the rules and boundaries for how employees can use company-provided technology resources, including computers, networks, email, internet access, software, and data systems.
Key Takeaways
An acceptable use policy draws the line between what employees can and can't do with company technology. It covers the laptops on their desks, the phones in their pockets (if company-issued), the Wi-Fi they connect to, the email they send, and the cloud platforms they log into. Every company needs one. It doesn't matter if you're a 10-person startup or a 50,000-employee enterprise. The moment you give someone access to a network, you need rules governing what they do on it. The AUP serves three purposes simultaneously: security (preventing actions that expose the company to cyber threats), legal protection (establishing that the company set clear expectations), and productivity (setting boundaries around personal use of work resources). Most AUP violations aren't malicious. They're an employee clicking a phishing link, installing unauthorized software, or storing customer data in a personal Dropbox folder. The policy exists so you can say you told them not to, and so they know what's expected before the incident happens.
A thorough AUP addresses every category of technology interaction. Here's what each section should cover.
| Component | Scope | Key Rules |
|---|---|---|
| Email Use | Company email accounts and any email sent from company devices | No forwarding company data to personal accounts, no opening suspicious attachments, professional tone in all communications, no mass personal mailings |
| Internet Browsing | All web activity on company networks and devices | No accessing illegal content, restricted categories (gambling, adult content), limited personal browsing during breaks only |
| Software and Apps | Installation and use of software on company devices | No unauthorized software installation, only approved app stores, no pirated software, shadow IT reporting process |
| Data Handling | Creation, storage, transfer, and deletion of company data | Classify data by sensitivity, encrypt sensitive files, no storage on personal devices or unauthorized cloud services, follow retention schedules |
| Social Media | Use of social platforms on company devices or representing the company | Personal social media use limited to breaks, no sharing confidential information, disclaimers when posting personal opinions about industry topics |
| Network Access | Company Wi-Fi, VPN, remote access systems | Strong passwords required, no sharing credentials, VPN required for remote access, no connecting unauthorized devices to the network |
| Physical Security | Laptops, phones, portable storage devices | Lock screens when away, no leaving devices unattended in public, report lost or stolen devices within 24 hours, no unauthorized USB drives |
The biggest gray area in any AUP is personal use. Getting this section right prevents most employee friction around the policy.
Most companies allow limited personal use of work devices and internet as long as it doesn't interfere with job performance, consume excessive bandwidth, expose the company to security risks, or violate any other provision of the AUP. 'Limited' should be quantified where possible: personal browsing during lunch and breaks is acceptable, streaming video or downloading large files for personal use is not. This approach recognizes that people are going to check their personal email at work regardless of what the policy says. Banning it entirely just drives it underground and creates resentment.
The AUP must clearly state that the company reserves the right to monitor all activity on company-owned devices and networks. This includes email content, browsing history, file access, and location data. Employees should have no expectation of privacy when using company technology. This statement is legally important. In the US, employer monitoring of company-owned devices is generally permissible under the Electronic Communications Privacy Act (ECPA) as long as employees are notified. The notification is the AUP itself. Without it, the company's ability to review employee activity in investigations is legally weakened.
The AUP is where cybersecurity policy meets individual employee behavior. These requirements form the human element of your security program.
Require strong, unique passwords for every system (minimum 12 characters with mixed character types). Mandate multi-factor authentication (MFA) for all cloud applications and remote access. Prohibit password sharing under any circumstances, including with IT staff (they don't need your password). Require password manager use and prohibit storing passwords in browsers, sticky notes, or unencrypted documents. These rules feel basic. They are basic. And they prevent the majority of credential-based attacks.
Include specific guidance on recognizing phishing emails, suspicious links, and social engineering attempts. Require employees to report suspicious messages to the IT security team rather than deleting them (deleting doesn't help the team identify active campaigns). Define a clear process for handling suspected phishing: don't click, don't reply, forward to the security team, delete after forwarding. Regular phishing simulation training should complement the policy, but the policy establishes the behavioral expectation.
Restrict or prohibit the use of USB drives, external hard drives, and unauthorized cloud storage services (personal Google Drive, Dropbox, iCloud). These are among the most common vectors for data exfiltration, whether intentional or accidental. If employees need to transfer files, provide approved methods: company-sanctioned cloud storage, encrypted email attachments, or secure file transfer platforms. Some companies disable USB ports entirely through endpoint management software. It's heavy-handed but effective in regulated industries.
An AUP without consequences is just a suggestion. Define clear, proportional responses to violations.
Not all violations are equal. Checking personal email during work hours isn't the same as downloading customer data to a personal drive. Categorize violations by severity: Minor (personal use beyond guidelines, minor browsing violations) results in verbal warning. Moderate (unauthorized software installation, sharing credentials, ignoring security protocols) results in written warning and mandatory retraining. Severe (data exfiltration, accessing illegal content, deliberate circumvention of security controls) results in suspension and possible termination. Critical (criminal activity, intentional data theft, compliance violations) results in immediate termination and potential legal action.
Define who investigates AUP violations (IT security, HR, or a joint team), how evidence is preserved (forensic imaging of devices), and how employees are notified. Maintain chain-of-custody documentation for all evidence. Investigations should be confidential and should follow the same procedural fairness as any other workplace investigation. The employee should have the opportunity to respond to allegations before disciplinary action is taken, unless the violation is so severe that immediate action is required (such as ongoing data theft).
Remote work has expanded the scope of acceptable use policies beyond the office network.
Employees working from home should be required to secure their home Wi-Fi with WPA3 encryption, change default router passwords, and keep router firmware updated. The AUP should require VPN use for all work activities on home networks. Some companies provide router configuration guides or even company-configured routers for remote workers. The policy can't control every aspect of a home network, but it can set minimum security standards.
Prohibit work on sensitive data while connected to public Wi-Fi without VPN. Require screen privacy filters when working in coffee shops, airports, or coworking spaces. Prohibit leaving company devices unattended in public locations. These rules feel obvious, but without them in the policy, you can't discipline an employee who leaves their unlocked laptop at a coffee shop while getting a refill. The policy creates the obligation.
Data on employee technology behavior, security incidents, and the role of acceptable use policies.
Practical guidance for building an AUP that employees actually read and follow.