Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Acceptable Use Policy
"I need an Acceptable Use Policy for a compliance-focused business, outlining user responsibilities, data protection measures, and prohibited activities, with quarterly reviews and updates to ensure alignment with evolving regulations."
What is an Acceptable Use Policy?
An Acceptable Use Policy sets clear rules for how people can use an organization's technology resources, like computers, networks, and data systems. Companies and government agencies in the Philippines create these policies to protect their digital assets and comply with the Data Privacy Act of 2012 and cybersecurity regulations.
The policy typically covers allowed and prohibited activities, security requirements, and consequences for violations. It helps organizations prevent data breaches, maintain system security, and ensure employees use tech resources responsibly. Many Filipino businesses require employees to sign this policy during onboarding, making it a key part of their information security framework.
When should you use an Acceptable Use Policy?
Organizations need an Acceptable Use Policy when introducing new technology systems or onboarding employees who will access company networks and data. This policy becomes essential for Philippine businesses managing sensitive information under the Data Privacy Act, especially in sectors like banking, healthcare, and business process outsourcing.
Put this policy in place before giving staff access to your IT resources - it protects both the company and employees by clearly defining acceptable behavior. It's particularly important when allowing remote work, implementing BYOD programs, or expanding digital operations. Many Philippine regulators and certification bodies also require documented technology use policies for compliance.
What are the different types of Acceptable Use Policy?
- Acceptable Use Agreement: A comprehensive policy covering all technology resources, commonly used by large corporations and BPO companies in the Philippines
- AUP Agreement: A simplified version focusing on basic network and system usage, ideal for small businesses and startups
- Email And Internet Usage Policy: Specifically addresses communication tools and internet access, popular in professional services and educational institutions
Who should typically use an Acceptable Use Policy?
- IT Directors and CIOs: Create and update the Acceptable Use Policy to align with technical infrastructure and security needs
- Legal Teams: Review and refine policy language to ensure compliance with Philippine data protection laws and regulations
- HR Managers: Distribute policies, collect signatures, and handle enforcement when violations occur
- Employees and Contractors: Must read, understand, and follow the policy guidelines when using company resources
- Data Protection Officers: Ensure the policy meets requirements under the Data Privacy Act and NPC guidelines
How do you write an Acceptable Use Policy?
- Technology Inventory: List all IT systems, devices, and networks that employees can access
- Security Requirements: Document password policies, access controls, and data handling procedures
- Company Culture: Consider your workplace norms when setting rules for social media and personal device use
- Legal Framework: Review Data Privacy Act requirements and NPC guidelines for digital security
- Violation Consequences: Define clear disciplinary actions for policy breaches
- Implementation Plan: Prepare training materials and signature collection process
- Policy Generation: Use our platform to create a compliant policy that includes all required elements
What should be included in an Acceptable Use Policy?
- Policy Overview: Clear statement of purpose and scope of technology usage rules
- Data Privacy Compliance: References to DPA 2012 requirements and NPC guidelines
- Acceptable Uses: Detailed list of permitted activities on company systems
- Prohibited Activities: Specific examples of forbidden actions and security risks
- Security Measures: Password requirements and data protection protocols
- Monitoring Notice: Disclosure of system monitoring and user privacy expectations
- Violation Consequences: Progressive discipline steps for policy breaches
- Acknowledgment Section: User signature and date fields for formal acceptance
What's the difference between an Acceptable Use Policy and a Cybersecurity Policy?
While both documents focus on IT security, an Acceptable Use Policy differs significantly from a Cybersecurity Policy. Here's how they complement each other while serving distinct purposes in Philippine organizations:
- Primary Focus: Acceptable Use Policies govern day-to-day user behavior and technology interaction, while Cybersecurity Policies outline broader security frameworks and technical safeguards
- Scope of Coverage: AUPs specifically address permitted and prohibited activities by users, whereas Cybersecurity Policies cover system-wide security measures, incident response, and technical controls
- Target Audience: AUPs are written for general employees and contractors, while Cybersecurity Policies primarily guide IT teams and security personnel
- Compliance Requirements: AUPs help meet basic Data Privacy Act obligations for user conduct, while Cybersecurity Policies address more complex NPC security requirements and industry standards
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it