Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Purpose and Scope: Outlines the objectives of the policy and who it applies to within the organization
2. Definitions: Defines key terms used throughout the policy including technical terminology
3. General Principles: Overview of the organization's approach to email and internet usage
4. Acceptable Use: Details what constitutes acceptable use of email and internet resources
5. Prohibited Activities: Clearly outlines activities that are strictly forbidden
6. Email Usage Guidelines: Specific rules and best practices for email communication
7. Internet Usage Guidelines: Specific rules and best practices for internet usage
8. Data Protection and Privacy: Explains how the organization handles data protection and privacy in line with GDPR
9. Security Requirements: Outlines security measures and requirements for safe usage
10. Monitoring and Surveillance: Explains the organization's approach to monitoring electronic communications
11. Compliance and Enforcement: Details consequences of policy violations and enforcement procedures
1. Remote Work Provisions: Special considerations for email and internet usage while working remotely
2. Social Media Usage: Guidelines specific to social media use, if not covered in a separate policy
3. Personal Device Usage (BYOD): Rules for using personal devices to access company email and internet
4. Industry-Specific Compliance: Additional requirements for regulated industries (e.g., financial services, healthcare)
5. International Communications: Special considerations for cross-border communications and data transfers
6. Emergency Procedures: Procedures for handling cybersecurity incidents or data breaches
1. Acceptable Use Agreement Form: Form for employees to sign acknowledging policy understanding
2. Technical Security Requirements: Detailed technical specifications for security measures
3. Password Policy Guidelines: Specific requirements for password creation and management
4. Approved Software List: List of approved software and applications for business use
5. Incident Response Procedures: Step-by-step procedures for handling security incidents
6. Email Signature Templates: Standardized email signature formats for organizational use
Find the exact document you need
Email And Internet Usage Policy
An Irish-law governed policy document establishing guidelines for workplace email and internet usage, ensuring compliance with GDPR and local data protection requirements.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)
.png)