Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Purpose and Scope: Defines the objectives of the policy and its applicability within the organization's ISO 27001 framework
2. Definitions: Detailed definitions of key terms used throughout the policy including assets, users, acceptable use, and security classifications
3. Asset Classification: Categorization of organization assets including information assets, software assets, physical assets, and services
4. General Usage Rules: Fundamental rules applicable to all asset types including authorized use, prohibited activities, and security practices
5. User Responsibilities: Specific obligations of users regarding asset handling, protection, and reporting of security incidents
6. Security Requirements: Detailed security controls and measures required for different types of assets in compliance with ISO 27001
7. Monitoring and Compliance: Framework for monitoring asset usage and ensuring compliance with policy requirements
1. Remote Working Provisions: Additional controls and requirements for using organizational assets in remote work settings
2. BYOD Guidelines: Specific requirements and controls for using personal devices to access organizational assets
3. Industry-Specific Requirements: Additional controls required for specific regulated industries (healthcare, financial services, etc.)
4. Cloud Services Usage: Guidelines for using cloud-based services and storing organizational assets in cloud environments
1. Schedule A - Asset Categories Matrix: Comprehensive list of asset types, classifications, and applicable security controls
2. Schedule B - User Acknowledgment Form: Template for users to formally acknowledge understanding and acceptance of the policy
3. Schedule C - Security Controls Matrix: Detailed matrix of security controls required for different asset types and classifications
4. Schedule D - Incident Response Procedures: Step-by-step procedures for handling and reporting asset-related security incidents
5. Schedule E - Compliance Checklist: Checklist for regular assessment of compliance with the acceptable use policy
Find the exact document you need
Workplace Acceptable Use Policy
A U.S.-compliant policy document establishing guidelines for acceptable use of company IT resources and systems.
Wireless Use Policy
A U.S.-compliant policy document establishing rules and requirements for wireless network usage within an organization.
Wireless Acceptable Use Policy
A U.S.-compliant policy document that governs the acceptable use of an organization's wireless network infrastructure and resources.
Website Acceptable Use Policy
A legal document governing website usage terms and conditions in the US, establishing rules for users while protecting the website owner's interests.
Use Policy
A legally binding document outlining terms and conditions for service usage under US law.
Use Of Technology Policy
A legally compliant framework for technology usage in US organizations, establishing guidelines for appropriate use of digital resources and systems.
Unacceptable Use Policy
A US-jurisdiction document that defines prohibited activities and behaviors when using a service or platform.
Technology Use Policy For Employees
A U.S.-compliant policy document that establishes guidelines and requirements for employee use of company technology resources.
Technology Use Policy
A U.S.-compliant policy document governing the use of organizational technology resources and systems.
Standard Acceptable Use Policy
A U.S.-compliant legal document defining rules and guidelines for acceptable use of services, networks, or platforms.
Staff Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT resources and systems by staff members.
Security Aup
A U.S.-governed policy document that defines acceptable use of organizational IT resources and security requirements for all system users.
Security Acceptable Use Policy
A policy document outlining acceptable use of organizational IT systems and security requirements, compliant with US regulations.
Responsible Use Policy
A US-compliant policy document that establishes guidelines for appropriate use of organizational IT resources and systems.
Responsible Internet Use Policy
A policy document outlining acceptable internet use guidelines and responsibilities within an organization, compliant with US federal and state regulations.
Resource Usage Policy
A U.S.-compliant policy document establishing guidelines for organizational resource usage and management.
Removable Media Acceptable Use Policy
A U.S.-compliant policy document governing the use of portable storage devices and removable media within an organization.
Remote Access Acceptable Use Policy
A US-compliant policy document establishing guidelines and requirements for secure remote access to organizational systems and data.
Network Use Policy
A legally binding document establishing guidelines for acceptable network use in U.S. organizations, compliant with federal and state regulations.
Network Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational network resources and infrastructure.
Mobile Phone Acceptable Use Policy
A U.S.-compliant policy document establishing guidelines for mobile device usage within organizations, including security, privacy, and compliance requirements.
Library Acceptable Use Policy
A U.S.-compliant policy document establishing rules and guidelines for library facility and resource usage.
It Usage Policy
A U.S.-compliant policy document defining acceptable use and security requirements for organizational IT resources.
It Aup
A U.S.-compliant policy document outlining acceptable use of organizational IT resources and systems.
It Appropriate Use Policy
A U.S.-compliant policy document establishing guidelines for proper use of organizational IT resources and systems.
It Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT resources and systems, including security protocols and user responsibilities.
Isp Acceptable Use Policy
A U.S.-compliant legal document defining rules and restrictions for using an ISP's network and services.
Internet Use Policy For Schools
A U.S.-compliant policy document establishing guidelines for internet usage in educational institutions, ensuring student safety and legal compliance.
Internet Use Policies
A US-compliant policy document establishing rules and guidelines for organizational internet usage and system access.
Internet And Email Acceptable Use Policy
A U.S.-compliant policy document establishing guidelines for appropriate use of organizational internet and email systems.
Internet Acceptable Use Policy For Employees
A U.S.-compliant policy document that governs employee internet and IT system usage within organizations, establishing guidelines and protecting company assets.
Infosec Acceptable Use Policy
A U.S.-compliant policy document defining acceptable use of organizational IT resources and security requirements.
Information Security Acceptable Use Standard
A U.S.-compliant standard defining acceptable use of information systems and data security requirements within an organization.
Information Security Acceptable Use Policy
A U.S.-compliant policy document establishing rules and guidelines for acceptable use of organizational IT resources and information security practices.
Ict Usage Policy
A U.S.-compliant policy document governing the use of organization's ICT resources and establishing user responsibilities.
Ict Acceptable Use Policy In The Workplace
A U.S.-compliant policy document defining acceptable use of company ICT resources and systems in the workplace.
Hospital Acceptable Use Policy
A U.S.-compliant policy document governing the appropriate use of hospital information systems and technology resources while ensuring HIPAA compliance.
Ethical Computer Use Policy
A U.S.-compliant policy document establishing guidelines for appropriate use of organizational computer systems and digital resources.
Employee Internet Usage Policy
A US-compliant policy document that governs employee internet usage in the workplace, establishing guidelines and protecting both employer and employee rights.
Employee Aup
A U.S.-compliant policy document that establishes guidelines for employee use of organization's IT resources and systems.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)
.png)