DEEDIX

AI Solutions

All SolutionsFull AI offerings overview
Custom AI AssistantTailored conversational AI
AI IntegrationSeamless AI deployment
AI ToolsExplore AI productivity tools

Built for

IndividualsAI tools for personal productivity
SMEsAI for small & medium businesses
EnterpriseEnterprise-grade AI solutions

Infrastructure

All ServicesBrowse all IT & tech services
Managed IT Support24/7 infrastructure management
Cloud SolutionsAWS, Azure & Google Cloud
CybersecurityEnterprise-grade protection

Build

AI IntegrationTailored AI strategies & solutions
Software DevelopmentWeb apps, SaaS & custom builds
IT ConsultingStrategy & transformation

Education

Technical Training60+ courses & certifications

Products

All ProductsBrowse all products
LogWatchReal-time log monitoring & analytics
EventsPivotEvent management & tracking platform
InventfulInventory & sales tracking platform

Developer Tools

All ToolsFree open-source dev tools
Secret SuiteCryptographic toolkit, local-first

Products

All Work
SaaS Products
Web Apps

IT Projects

Cloud
Security
Enterprise

Education

Technical Trainings

Browse

All Resources40 free professional IT resources
AI ResourcesGenerative AI tools & guides
SEO ChecklistStep-by-step SEO audit guide

Security & Cloud

Audits & Assessments6 IT audit checklists
Cloud & Migrations6 migration planners
IT Policies7 ready-to-use templates

Build & Dev

Web & Development6 dev & launch checklists
AI & Automation4 AI tools & workflow guides
Directories3 curated tool lists

Grow

Career & Learning4 roadmaps & study plans
Business & Strategy4 templates & planners

Work With Us

Our Services
Get a Quote

Resources

Free Downloads
Whitepapers
FAQ

Shop

Smartphones
Gaming Consoles
Laptops
Accessories

Account

Track My Order
My Account
Get Started
Get Started
HomeResourcesIT Templates & Policies
IT Templates & PoliciesTemplate
10 min read

IT Acceptable Use Policy Template

Ready-to-use AUP template covering device usage, internet access, software installation, data handling, BYOD, and disciplinary procedures - copy-paste ready.

An IT Acceptable Use Policy (AUP) defines the rules governing how employees, contractors, and visitors may use company IT systems, devices, and data. It's a foundational document for ISO 27001 compliance, Cyber Essentials certification, and protecting the organisation from insider threat and liability. Review annually and require all staff to sign.

On this page

  • Policy Template - Device & System Usage
  • Policy Template - Internet & Email
  • Policy Template - Data Handling & Classification
  • Policy Template - BYOD (Bring Your Own Device)
  • AUP Implementation Checklist

Policy Template - Device & System Usage

SECTION 1: DEVICE USAGE

1.1 Company-Issued Devices
All company-issued devices (laptops, phones, tablets) must be used primarily for business purposes.
Personal use is permitted on a limited, reasonable basis provided it does not:
  - Compromise device security
  - Use excessive bandwidth or storage
  - Access inappropriate content

1.2 Device Security
Users must:
  - Keep operating systems and applications updated
  - Never disable antivirus/endpoint protection software
  - Never share devices with non-employees without IT approval
  - Lock screen when stepping away (Windows+L / Cmd+Ctrl+Q)
  - Report lost or stolen devices to IT immediately (within 2 hours)

1.3 Encryption
All company devices must have full-disk encryption enabled:
  - Windows: BitLocker
  - macOS: FileVault
  - Mobile: Enable device encryption and PIN/biometric lock

Policy Template - Internet & Email

SECTION 2: INTERNET AND EMAIL USE

2.1 Acceptable Internet Use
The following is prohibited on company systems and networks:
  - Accessing pornographic, extremist, or illegal content
  - Downloading software without IT approval
  - Circumventing web filters or using anonymising proxies
  - Conducting personal business for commercial gain
  - Streaming media that consumes excessive bandwidth during business hours

2.2 Email Usage
  - Company email must only be used for business purposes
  - Do not send sensitive personal data (PII, financial data) via unencrypted email
  - Phishing emails: do not click links - report to IT via the Phish Alert Button (PAB)
  - Do not create mailing lists or mass-mail without Marketing approval
  - Auto-forwarding to personal email accounts is prohibited

2.3 Social Media
  - Do not post confidential company information on social media
  - Do not make public statements on behalf of the company without authorisation
  - Clearly state when views are personal and not those of [Company Name]

Policy Template - Data Handling & Classification

SECTION 3: DATA CLASSIFICATION AND HANDLING

3.1 Data Classification Levels
  PUBLIC: Approved for external distribution (marketing materials, published docs)
  INTERNAL: For employees only; not for external distribution
  CONFIDENTIAL: Sensitive business data; limited distribution on need-to-know basis
  RESTRICTED: Highly sensitive (PII, financial data, medical); strict access and handling required

3.2 Handling Rules by Classification
  - CONFIDENTIAL and RESTRICTED data must never be stored on personal devices
  - RESTRICTED data must be encrypted at rest and in transit
  - RESTRICTED data must not be emailed without encryption (use Virtru, Tresorit, or similar)
  - Physical documents containing RESTRICTED data must be stored securely and shredded when no longer needed

3.3 Personal Data (GDPR)
  - Personal data must only be processed for the specific purpose for which it was collected
  - Personal data must not leave the UK/EEA without appropriate safeguards
  - Requests from individuals to access, delete, or export their data must be escalated to the DPO within 24 hours

Policy Template - BYOD (Bring Your Own Device)

SECTION 4: BRING YOUR OWN DEVICE (BYOD)

4.1 Enrollment
Personal devices used for work must be enrolled in the company Mobile Device Management (MDM) system
before accessing company data. Contact IT to enroll your device.

4.2 Required Security Controls
Enrolled personal devices must have:
  - Minimum 6-digit PIN or biometric lock
  - Up-to-date operating system (within 1 major version of current)
  - Device encryption enabled
  - Up-to-date antivirus (iOS/Android built-in is acceptable)

4.3 Company Rights on BYOD
By enrolling a personal device, you consent to:
  - Remote wipe of COMPANY DATA ONLY (not personal data) in the event of loss or theft
  - Monitoring of corporate email and company-data access (not personal data)
  - Removal of company applications and data upon employment termination

4.4 Separation of Personal and Corporate Data
  - Company data must be accessed via company-approved apps only (not downloaded copies)
  - Do not transfer company data to personal apps (e.g. copying work files to personal Google Drive)

AUP Implementation Checklist

0/6 complete

What’s next?

More ResourcesBrowse IT Templates & PoliciesView category Implement ItIT ComplianceView services Build SkillsGovernance CoursesExplore courses
Back to all resources

On this page

  • Policy Template - Device & System Usage
  • Policy Template - Internet & Email
  • Policy Template - Data Handling & Classification
  • Policy Template - BYOD (Bring Your Own Device)
  • AUP Implementation Checklist

Related Resources

  • Password & Access Control Policy Template
  • IT Onboarding Checklist for New Staff
  • GDPR Compliance Checklist for SMEs

Explore Further

  • More in this category
  • IT Compliance
  • Governance Courses
  • Related blog posts

Need hands-on help?

Our team can implement, audit, or consult on any of these areas for your business.

Talk to an expert

Contact Us:

info@deedixtech.com
+234 807 438 7880 NG+1 365-655-0498 CA
DEEDIX

Delivering AI solutions, cloud expertise, cybersecurity protection, and digital branding support since 2022.
Infinite possibilities for your business.

info@deedixtech.com+234 807 438 7880 NG+1 365-655-0498 CA
  • For Individuals
  • For Enterprise
  • Global Infrastructure
  • AppStore
  • About Us
  • Our Team
  • Careers
  • Digital Agency
  • DeediX AI
  • Managed IT
  • Cloud Solutions
  • Cybersecurity
  • IT Consulting
  • IT Tips
  • Tools
  • Case Studies
  • Whitepapers
  • FAQ

Get Started

  • For Individuals
  • For Enterprise
  • Global Infrastructure
  • AppStore

Company

  • About Us
  • Our Team
  • Careers
  • Digital Agency

Services

  • DeediX AI
  • Managed IT
  • Cloud Solutions
  • Cybersecurity
  • IT Consulting

Resources

  • IT Tips
  • Tools
  • Case Studies
  • Whitepapers
  • FAQ

Stay Updated

Latest IT insights and company updates.

Product names, logos, and trademarks referenced on this site are the property of their respective owners.
© 2026 DeediX Technologies. RC:1976012
SitemapPrivacyTermsTrademarks

Protected by Google reCAPTCHA Privacy Policy and Terms of Service apply.