BDC Hamburger Icon

MENU

Close
BDC Logo
Search Icon
Advertising Disclosure
Close
Advertising Disclosure

Business.com aims to help business owners make informed decisions to support and grow their companies. We research and recommend products and services suitable for various business types, investing thousands of hours each year in this process.

As a business, we need to generate revenue to sustain our content. We have financial relationships with some companies we cover, earning commissions when readers purchase from our partners or share information about their needs. These relationships do not dictate our advice and recommendations. Our editorial team independently evaluates and recommends products and services based on their research and expertise. Learn more about our process and partners here.

Updated Nov 01, 2023

Why You Need an Acceptable Use Policy and How to Create One

Ensure you and your employees are on the same page about on-the-clock device and internet usage.

author image
Written By: Andrew MartinsSenior Analyst & Expert on Business Strategy
Verified CheckEditor Verified:
Verified Check
Editor Verified
Close
A business.com editor verified this analysis to ensure it meets our standards for accuracy, expertise and integrity.
Gretchen Grunburg
Senior Editor & Expert on Business Strategy
Business.com earns commissions from some listed providers. Editorial Guidelines.
Table Of Contents Icon

Table of Contents

Open row

As a small business owner, you have rules your employees must follow during their workday, whether they’re in the office or working remotely. That same concept can be applied to their interaction with your company’s computers and digital network – especially since a single mistake can put critical data at risk. By establishing an acceptable use policy, you direct how you expect your employees to use their work computers, devices and the internet while on the clock.

Editor’s note: Need employee monitoring software for your business? Fill out the below questionnaire to have our vendor partners contact you with free information.

What is an acceptable use policy (AUP)?

An acceptable use policy (AUP) in the workplace, also known as an acceptable usage policy or fair use policy, establishes rules for how employees can use their company’s computer system and access its network. It also covers the kind of data they can use after being granted network access.

An AUP is not just a set of rules for employees using the company’s technological resources. It’s an educational document that teaches employees proper information security and data management practices. It’s also a semi-legal document that can have repercussions for those who don’t follow the guidelines.

TipBottom line
Like your remote work policy and attendance policy, your AUP should be written clearly and in plain language. The more understandable your official policies are, the more effective they'll be.

Acceptable use policy vs. end-user license agreement

What sets an AUP apart from other user agreements – like the standard end-user license agreement (EULA) that most people quickly skim before hitting “I accept” – is that it applies to a much larger system. While an EULA is for a single piece of software, an AUP applies to entire networks and websites. It addresses how employees are expected to comport themselves while using your business’s resources. While a EULA focuses on the client (end user), an AUP is for employees.

Why do you need an acceptable use policy?

A digitally connected workplace comes with specific security and cyber risks. An AUP can help mitigate those risks by establishing clear guidelines for your staff on device (e.g., computer, laptop, cell phone) and network usage.

In addition to educating your team on proper and improper device and network use, the policy clearly outlines sanctions that may occur to those who fail to comply. An acceptable use policy can also help legally protect your organization in the event of a security breach or audit. It’s an integral part of every IT security protocol and can prove due diligence.

Benefits of an acceptable use policy

There are multiple benefits to having an acceptable use policy in place, including the following:

  1. AUPs educate employees. An AUP educates employees about business cybersecurity threats and how to avoid them. For example, it may list specific websites known to contain malware. By avoiding these sites, the company’s system and data are protected.
  2. AUPs stress that network security is critical. An AUP reinforces the seriousness with which the company views violations through an enforcement section with consequences detailed.
  3. AUPs can improve employee productivity. You can improve productivity by limiting employees’ use of company equipment and internet access to work activities instead of checking social media feeds.
  4. AUPs help with legal compliance. An AUP aligns company policy with relevant regulations and laws, such as credit card processing laws like the PCI DSS, which protect customer data, and HIPAA laws, which protect medical data. An AUP shields IT professionals from potential errors and omissions lawsuits.
  5. AUPs protect the business. An AUP insulates the company from liability for illegal actions by its employees. For example, if an employee pirates videos and you don’t have an AUP in place that prohibits such activity, your company could be sued.
  6. AUPs can help control data backup costs. If employees download large files for personal use on your network, your business will unwittingly pay to back up useless data.
  7. AUPs limit company liability. An AUP limits company liability in the event of a data breach. A good AUP insulates the company and shows that it fulfilled its obligation to due diligence.

What should you include in an acceptable use policy?

The following elements should be included in your AUP: 

1. Overall restrictions

Since your AUP is designed to explain what can and cannot take place on your company’s work computers or network, stating what’s forbidden is critical. Your final AUP should tell employees that the following actions will not be tolerated:

  • Taking part in any illegal activity
  • Bypassing device and network security
  • Participating in unauthorized electronic communication
  • Installing malicious software
  • Disclosing confidential information

Your overall restrictions can also include forbidden websites, email response guidelines and more.

2. Software installation rules

Software installation security practices can protect your business. Any system administrator will likely tell you that installing a new program on a company device is carefully planned and executed. If your company relies on a secure digital environment, you must consider how much freedom employees have to install new software. Without setting guidelines, employees may install software or apps that introduce security risks, exposing the network to unauthorized access by bad actors.

FYIDid you know
Further bolster your AUP and protect your network and devices by installing the best internet security and antivirus software.

3. BYOD and remote work policies

Your employees are accustomed to using their own devices, so some may want to bring them into the office. Additionally, remote work is commonplace, further increasing the use of personal devices for work. If you have a bring-your-own-device (BYOD) policy or allow remote workers to use their personal devices, your AUP must require employees to implement specific mobile device security measures.

While it may be convenient for employees to use their own devices, Ivan Kot, director of customer acquisition at Itransition, said careful consideration is needed for AUPs governing BYOD usage. “Employees often use their personal devices while accessing global and corporate networks through their private channels,” Kot warned. “This raises cybersecurity risks dramatically and exposes corporate infrastructures to external intrusions. In this situation, acceptable use policies are the key documents stipulating acceptable and secure ways for employees to use corporate and personal resources for work-related purposes.”

Your AUP must clearly state that employee monitoring efforts will apply to the use of employee-owned devices only during work hours and that private use will remain private. For remote work, your policy can require a VPN or other encrypted connection service to protect your company’s copyrighted material, personal information and intellectual property from security breaches.

TipBottom line
Provide examples of permitted exceptions to mobile device usage in your AUP. For example, if you prohibit using personal mobile apps on a company-issued mobile device, you may want to allow using the weather app and other well-known and low-risk apps.

4. Social media and internet usage guidelines

Social media platforms are incredibly popular; you’re sure to have employees who browse them at work. Though these platforms can be an excellent and immediate source of information, they can also be a massive time suck. 

An AUP can set rules banning the use of social media platforms while connected to the network, helping employees manage their time and productivity – incredibly important resources to any small business. You may also want to include rules and restrictions for internet surfing.

5. Consequences

A company policy is only as strong as its enforcement measures. An AUP should be a series of rules that will be enforced. Failure to adhere to an AUP can have dire ramifications for the company, so it’s crucial to establish consequences – up to and including legal action – to address employee missteps. The security of your company’s intellectual property and infrastructure depends on it.

TipBottom line
Include all ramifications of failure to adhere to the AUP in your disciplinary action policy so everyone understands the consequences.

How do you create your own acceptable use policy?

AUPs are as unique as the companies that adopt them; what works for one setup may not work for yours. As with any other company policy, you must consider how it will change the workplace and what problems may arise from its implementation.

Once you’ve decided what to include in the policy, take the following steps:

  • Find an AUP template. You can find premade templates that fit your needs online. For example, the SANS Institute has an acceptable use policy template to help businesses outline the acceptable usage of devices and equipment. It also covers necessary employee security measures to protect proprietary information.
  • Include all restrictions and guidelines. Populate your AUP template with your overall restrictions, software installation rules, BYOD and remote work policies, social media guidelines, and consequences for noncompliance. 
  • Investigate additional applicable legal regulations in your AUP. An AUP primarily consists of best practices and guidelines. However, some companies are subject to additional regulations, including federal and international laws. Since a good AUP will bolster your data security, keep any regulatory concerns in mind when drafting it. For example, if your company deals with healthcare issues, you may be required to follow federal HIPAA guidelines, PCI regulations and GDPR rules. You must also ensure the AUP follows state, federal and local security laws.

What are best practices for implementing and enforcing an AUP?

Once you’ve decided what to include in your acceptable use policy, you must implement it and enforce it in your company. Here are some tips to smooth the process:

  • Write up your AUP in plain language. All employees must understand your AUP. Remember that most won’t have extensive legal and technical knowledge. Write your AUP in straightforward language with minimal IT tech jargon, legal terms and acronyms. 
  • Train employees on the AUP. Have a meeting or class where you explain your AUP. Share how it benefits the company (i.e., protecting the business from data breaches and shielding it from lawsuits) and how it will be enforced. Highlight changes employees must make in their day-to-day activities, and answer any employee questions about the policy.
  • Have employees agree to the AUP. Distribute written copies of the AUP, and have each employee sign it to indicate that they understand and agree to the policy. Include this in the onboarding process for all new hires. Keep these signed agreements with your human resources files in case of a future breach or legal issue.
  • Keep the AUP top of mind. Occasionally remind employees of the policy’s details so the information stays fresh in their minds. You may even want to quiz them on specific aspects to emphasize the document’s importance. Employees who do poorly on this test can be sent to additional training to reinforce the information; consider giving a small reward to those who do well. 
  • Schedule periodic policy reviews. Schedule a review of your AUP every year to see if it must be changed in any way. Reviews may be done sooner if an event impacts the policy, such as a new business process, product, law or ownership change.
Did You Know?Did you know
Remote monitoring and management (RMM) software can help businesses monitor their remote workforce's devices and bolster network security.

What privacy concerns exist with an acceptable use policy?

Enforcement is a crucial aspect of an AUP. Some businesses employ user activity monitoring software and tools to discover when employees fail to meet the policy’s requirements. 

The best employee monitoring software can ensure your AUP is being adhered to properly. For example, our review of ActivTrak and our InterGuard review explain how these solutions can improve cybersecurity and productivity. However, there are pros and cons to monitoring employees. Employees are often leery of this type of software, so employers must tread carefully. 

“Individual privacy and freedom remains one of the most disputable issues of AUP,” Kot explained. “Some companies choose to monitor their employees’ devices 24/7 without leaving a chance for private use. Others prefer to determine each and every way employees should perform their work, which deprives employees of any flexibility in their actions.”

When implementing employee monitoring software, be sure to detail its usage in your AUP. You must be crystal clear with your employees about when they will be monitored. Kot encourages business owners to keep their employees’ privacy issues in mind and “opt for reasonable AUP while staying away from hyper-control and setting unnecessary boundaries in employees’ daily work.” 

Jennifer Dublino contributed to this article. Source interviews were conducted for a previous version of this article.

Did you find this content helpful?
Verified CheckThank you for your feedback!
author image
Written By: Andrew MartinsSenior Analyst & Expert on Business Strategy
Andrew Martins is an award-winning expert in business and economics, known for his meticulous analysis of industry trends and his deep understanding of small business dynamics. With years of hands-on experience and on-the-ground reporting, Martins has crafted invaluable guides about essential topics in small business technology and finance. At business.com, Martins covers tech concepts like big data, acceptable use and keystroke logging, along with finance subjects like tax audits and business credit cards. In recent years, Martins has turned his attention to examining the impact of major events such as the 2020 presidential election and the COVID-19 pandemic on small businesses. Armed with a bachelor's degree in communication, his work has been featured on respected financial platforms like Investopedia, The Balance and LowerMyBills, as well as technology outlet Lifewire, and the pages of the New York Daily News.
BDC Logo

Get Weekly 5-Minute Business Advice

B. newsletter is your digest of bite-sized news, thought & brand leadership, and entertainment. All in one email.

Back to top