The Employee Acceptable Use Policy Template you see on this page is a reusable formal template drafted by professional lawyers in line with federal and regional regulations. For more than 25 years, US Legal Forms has provided people, businesses, and attorneys with more than 85,000 verified, state-specific forms for any business and personal situation. It’s the quickest, simplest and most trustworthy way to obtain the documents you need, as the service guarantees bank-level data security and anti-malware protection.
Acquiring this Employee Acceptable Use Policy Template will take you just a few simple steps:
Sign up for US Legal Forms to have verified legal templates for all of life’s scenarios at your disposal.
Encryption policies not be part of an acceptable use policy.
Don't use the Internet to gain unauthorized access to other information systems, networks, or computers. Don't use another person's password to access the Internet. Don't send messages that mislead or confuse the recipient as to who is sending the message. Don't allow others to use personal passwords.
Encryption policies not be part of an acceptable use policy.
Since your AUP is designed to explain what can and cannot take place on your company's work computers or network, stating what's forbidden is critical. Your final AUP should tell employees that the following actions will not be tolerated: Taking part in any illegal activity. Bypassing device and network security.
Personnel should not download, , or run security programs or utilities that reveal or exploit weakness in the security of a system. For example, (Company) personnel should not run password cracking programs, packet sniffers, port scanners, or any other non-approved programs on any (Company) Information Resource.