Policy Pros
Written by Policy Pros, UK Policy Writing SpecialistsLast reviewed Published

Acceptable Use Policy (AUP) Writers

What are Acceptable Use Policies?

Acceptable use policies outline how employees, contractors and third parties may use an organisation’s IT systems, networks and digital tools in a lawful, secure and responsible manner.

These policies help protect organisational assets, ensure compliance with legal and regulatory obligations, and set clear expectations for appropriate behaviour when using technology at work.

What Do Acceptable Use Policies Cover?

An acceptable use policy typically includes:

  • Permitted and prohibited uses of email, internet and internal systems

  • Expectations for personal use of company equipment

  • Protection of confidential data and intellectual property

  • Prohibited activities such as accessing inappropriate content or unauthorised software

  • Use of social media, messaging tools and file sharing platforms

  • Monitoring and audit procedures

  • Links to IT security, disciplinary and remote working policies

A clear policy helps ensure that all users understand their responsibilities and the consequences of misuse. It supports the organisation in managing risk, reducing exposure to malware, data loss or reputational damage.

It also demonstrates due diligence and helps fulfil legal duties under data protection law, copyright legislation and cybersecurity standards, including ISO 27001 or Cyber Essentials.

Acceptable use policies are vital in today’s connected workplace where multiple devices and cloud services are routinely used. They set the tone for responsible digital behaviour and support a respectful, secure working environment.

By regularly reviewing and communicating the policy, businesses can promote digital awareness and ensure that staff and contractors remain aligned with the organisation’s standards.

Legal Basis and Standards

An acceptable use policy (AUP) is a foundational governance document that operationalises UK GDPR Article 32 (organisational measures), the Computer Misuse Act 1990 (employee account integrity), the Equality Act 2010 (online conduct), the Defamation Act 2013, ISO 27001:2022 control A.5.10 (acceptable use), Cyber Essentials (User Access Control), and the Worker Protection Act 2023 (online sexual harassment).

Common Compliance Pitfalls

  • One catch-all AUP for all systems, with no system-specific rules where they materially differ (email, shared drives, customer systems, social media).
  • Personal use clauses absent or contradictory across documents.
  • Monitoring expectations not aligned to UK GDPR Article 6 lawful basis or to the privacy notice.
  • Remote and BYOD use insufficiently addressed.
  • No review cadence as new systems are introduced.

What Policy Pros Delivers

Our Acceptable Use Policy package includes the main policy, system-specific addenda (email, shared storage, mobile, BYOD, social media, AI assistants), a monitoring and privacy notice, a personal use position, and integration with the disciplinary, harassment and information security policies.

Frequently Asked Questions

Should we have separate AUPs for different systems?

One umbrella AUP with system-specific addenda is the cleanest pattern (email, mobile, social media, AI tools). It avoids contradictory rules and supports targeted training for higher-risk systems.

Can we ban personal use entirely?

Legally yes, but practically it is rarely effective. A defined scope of acceptable personal use, with monitoring transparency, generally produces better adherence than a blanket ban that is unenforceable.

Does the AUP apply to BYOD?

Yes. Personal devices used to access organisational data are within the AUP scope, with additional MDM and access-control rules applied via the BYOD agreement.

Trustpilot Reviews - 5 Stars