Acceptable Use Policy

Defines acceptable and prohibited uses of company systems and data. Required for SOC 2 CC1.1 and CC6.1. This free, professionally written template from Proveably is ready to download in multiple formats and customise for your organisation. No account required.

Sets clear expectations for how employees may use company technology, networks, and data. Covers personal use guidelines, prohibited activities, monitoring notice, and consequences for violations.

soc2 iso27001
400 words ~8 min read 0 downloads Free
Link copied!
Free

No account required

Browse All Templates
Categorypolicy
Formatmarkdown
Downloads0

Why You Need This Acceptable Use Policy

A well-documented Acceptable Use Policy is essential for organisations pursuing compliance certifications and building trust with customers, partners, and auditors. Without formal documentation, your organisation faces several risks:

  • Audit failures — Auditors specifically check for documented policies. A missing or incomplete policy is one of the most common reasons organisations fail SOC 2, ISO 27001, or other compliance audits.
  • Security gaps — Without clear guidelines, employees and contractors may follow inconsistent security practices, creating vulnerabilities.
  • Regulatory exposure — Many regulations (GDPR, HIPAA, PCI DSS) require documented policies. Non-compliance can result in fines and legal liability.
  • Lost business opportunities — Enterprise customers increasingly require vendors to demonstrate formal security policies before signing contracts.

This Proveably template gives you a professional starting point that covers industry best practices and maps directly to compliance framework requirements.

Compliance Framework Requirements

This template is designed to satisfy requirements from the following frameworks:

soc2

This template addresses key soc2 control requirements with pre-mapped sections and audit-ready language.

iso27001

This template addresses key iso27001 control requirements with pre-mapped sections and audit-ready language.

Specifically mapped control codes: CC1.1, CC6.1, CC6.6, A.5.10

Template Preview

# Acceptable Use Policy ## 1. Purpose This policy defines the acceptable use of **[Company Name]** technology resources and data to protect our systems, customers, and employees. ## 2. Scope This policy applies to all employees, contractors, interns, and third-party users of company IT resources. ## 3. General Use ### 3.1 Company-Owned Devices - Must be used primarily for authorized business purposes - Must run approved endpoint protection (EDR/antivirus) - Must have disk encryption enabled (FileVault / BitLocker) - Must be kept up to date with OS and application patches - Must be locked when unattended (auto-lock within 5 minutes) ### 3.2 Personal Devices (BYOD) - Personal devices may access company resources only through approved MDM enrollment - Company data must not be stored locally on personal devices - Company reserves the right to remotely wipe corporate data from personal devices ## 4. Internet & Email Use ### 4.1 Acceptable - Business research, communication with clients and partners - Professional development and training - Limited personal use during non-work hours ### 4.2 Prohibited - Accessing illegal, offensive, or malicious websites - Downloading pirated software, media, or content - Using company email for personal commercial activities - Opening suspicious attachments or clicking unverified links - Sending confidential data to personal email accounts ## 5. Software & Applications - Only approved software may be installed on company devices - All software requests must go through the IT/Security team - Open-source software must be reviewed for licensing and security before use - Shadow IT (unapproved SaaS tools) is prohibited for processing company data ## 6. Network & System Access - Employees must use the company VPN when accessing resources remotely - Network scanning, packet sniffing, or penetration testing is prohibited without authorization - Sharing of network credentials or VPN access is prohibited - Use of proxy services to bypass content filtering is prohibited ## 7. Monitoring **[Company Name]** reserves the right to monitor, log, and audit all activity on company-owned systems and networks. This includes email, web browsing, file transfers, and application usage. Users should have no expectation of privacy when using company resources. ## 8. Enforcement - First violation: Written warning and mandatory security training - Second violation: Suspension of access privileges pending review - Severe or repeated violations: Termination of employment ## 9. Review This policy is reviewed annually. Employees must acknowledge this policy upon hire and annually thereafter. --- *Approved by: [Name, Title]* *Effective Date: [Date]* *Version: 1.0*

Frequently Asked Questions

An Acceptable Use Policy is a formal policy that defines acceptable and prohibited uses of company systems and data. required for soc 2 cc1.1 and cc6.1. It provides a structured framework for organisations to document and enforce security and compliance requirements.
Yes. Proveably provides this Acceptable Use Policy template completely free of charge. You can download it in Markdown, PDF, Word, Excel, or plain text format — no account required.
This policy is mapped to soc2, iso27001. It includes the specific control references and requirements needed to satisfy auditor expectations for these frameworks.
Download the template in your preferred format, then customise the bracketed placeholder sections with your organisation's specific details. Review with your security team or compliance officer, get management approval, and distribute to relevant staff. Proveably recommends reviewing and updating this policy at least annually.
Absolutely. This template is designed as a starting point. All sections should be tailored to your organisation's size, industry, and specific compliance requirements. The placeholder text indicates sections that require customisation.

Report a Bug

Help us improve by reporting issues

Screenshot
Page:
Browser:
Time:

Bug Report Submitted

Thank you! We'll investigate this issue.