Contact Sales: |   Support: | Pay My BillClient SupportLet’s Talk!

Why Adopt an Acceptable Use Policy?

An acceptable use policy, also known as an “acceptable usage policy” or a “fair use policy,” is a written document that outlines acceptable and unacceptable behaviors for employees who use work-issued devices. When businesses adopt an acceptable use policy, they are adding another layer of security for their network, and it’s more important now that employees are working remotely.

An acceptable usage policy is drafted by business owners, administrative officers, or IT administrators to clearly define the use of company-issued devices. The document covers phone usage guidelines, online activities, private email use and more. 

Why Should My Smaller Business Adopt an Acceptable Use Policy?

You may think that your business is too small to need to adopt an acceptable use policy.  Remember, though, that small to medium-sized businesses make up nearly half of all cybercriminal activity.  Also consider that most data breaches are because of some form of employee negligence. It’s estimated that 92% of malware incidents are accidentally caused via email. 

Adopting an acceptable use policy reduces the possibility of an employee unintentionally installing malware while performing “unsanctioned” online activities. 

Adopting an acceptable use policy not only reduces your vulnerabilities, but it also boosts employee efficiency and productivity. 

Is Drafting an Acceptable Use Policy Really That Important?

Adopting an acceptable use policy could mean the difference between employee compliance and negligent online behavior.

Giving your employees a top-of-the-line mobile device, shiny new workstation, or a sleek new laptop is a part of life for small to medium sized business owners. Most employees will never knowingly engage in risky online behaviors, but there is always the chance that their online presence will open doors for a hacker to enter your network. Adopting an acceptable use policy ensures that your employees use their company-issued devices for work rather than shopping the best online deals, watching cat videos on You Tube, or visiting sites that place your network at risk. 

An acceptable use policy reminds your employees that, while working, online activities may be monitored.  In other words, your teams become aware that, while using company-issued devices, their activities are not necessarily private. Your “spy powers” should never be abused, but they should be taken seriously by all employees.  While there are certain lines that shouldn’t be crossed, in today’s ever-evolving world of cybercrime it’s vitally important that you stop unwanted and potentially risky online behaviors. Special precautions should be taken to protect your network, devices, and your Wi-Fi connections from unintentional employee negligence. 

It’s estimated that 80% of businesses keep track of employees’ internet usage, from checking personal emails to web browsing.  These companies drastically reduce the risk of cyberattacks and they find that monitoring internet usage increases productivity as well.  

Acceptable Use Policies Can Lower Your Liabilities 

Risky online computer behavior comes in many shapes and sizes. Just a few examples include: 

  • Industry violations such as HIPAA or SOX  
  • Downloading illegal files 
  • Uploading offensive content to sites  
  • Cyberbullying 
  • Illegal activities 
  • Clicking risky links 

Adopting an acceptable use policy provides you with a kind of limited safety net. It may not completely remove liability from your organization, but the courts will be far more understanding if you have an employee’s signed acceptable usage policy in the case of industry violations, data breaches, or criminal activity.  A signed acceptable use document proves that your company took basic steps to address potential online offenses before they occurred.

Iconic IT Can Help Your Organization Adopt an Acceptable Use Policy

Iconic IT recommends that businesses adopt an acceptable use policy. We understand that the process can seem daunting, however; we are here for you. We will help you draft and enforce your acceptable use policy. Contact Iconic IT for a free, no obligation consultation and let us help you write and implement a comprehensive acceptable usage policy for your company today. 

New call-to-action


Cyber Resilience Blog

What is Cyber Resilience?

Wondering how to achieve cyber resilience in your company? We can show you how you need to reframe your thinking around security, so you’re prepared to act when the inevitable hacks occur.
Read Post
DHS/FEMA Nonprofit Security Grant Program Blog

Is Your Organization Eligible for the Nonprofit Security Grant Program?

Need more security equipment at your nonprofit? You could be eligible for an up to $150,000 DHS/FEMA nonprofit Security Grant Program that could cover your costs. We’ll show you how to apply.
Read Post
future of manufacturing technology Blog

What Is Manufacturing Technology Going to Look Like in the Future?

What is manufacturing technology going to be like in the future? It’s unfolding now, with AI, IoT, 3D printing and so much more. Here’s the latest.
Read Post