Acceptable Use Policy Template v1.0
Acceptable Use Policy Template v1.0
Date:
Acceptable Use Policy Template
Document Control
Document
Acceptable Use Policy Template
Title:
Document ID: Version: 0.1
Status: Draft
Publish Date:
Document Review
Version
No. Date Reviewer(s) Remarks
Acceptable Use Policy Template
Table of Contents
1. Objective.....................................................................................3
2. Scope..........................................................................................4
3. Policy...........................................................................................4
4. Exceptions...................................................................................8
5. Enforcement................................................................................8
7. Policy Commitment.....................................................................8
Acceptable Use Policy Template
1. Objective
The purpose of this policy is to outline the acceptable use of Information
Technology (IT) resources. These rules are in place to protect the entity employees
(users) from unacceptable uses and practices that can expose them to the risks
including virus attacks, compromise of network, application systems and services,
and legal issues.
2. Scope
This policy applies to all entity employees, contracted personnel, trainees, third
party's representatives who have been provided access to the IT assets at entity.
This policy covers all information systems (Environments operated by the IT team).
3. Policy
3.1.1 Use of the IT systems and resources at <entity name> must at all the time
be performed in a professional and accountable form.
3.1.3 Users are responsible for protecting any information used and/or
stored/accessible through their individual user accounts in the <entity name>
from unauthorized use or disclosure.
3.1.4 Users shall access, use, or share <entity name>’s proprietary assets only to
the extent it is authorized and necessary to fulfil their assigned job duties.
3.1.5 Users are responsible to promptly report any theft, loss, or unauthorized
disclosure of proprietary information.
3.1.7 Users shall not attempt to access any data or programs contained on any
system for which they do not have authorization or explicit written consent of
the owner of the system.
3.1.8 Each user is responsible for adherence this policy in its letter and spirit in the
<entity name>.
Acceptable Use Policy Template
3.1.9 Users shall not disclose <entity name> information to everyone within the
<entity name> and to anyone outside the <entity name> without proper
authorisation. All information available to the user in his/her business area or
account will be in accordance with Law No. (16) Of 2014 concerning
Protection of State Information and Documents.
3.1.10 Users shall not attempt to access any data or programs contained on any
system for which they do not have authorization or explicit written approval
from system owner.
3.1.11 Users shall report any weaknesses they discover in systems and any
incidents of possible misuse or violation of <entity name>’s policies, to the
proper authorities by contacting the IT team.
3.1.12 The email system is an entity resource and users are expected to utilize this
in accordance with Email Security Policy.
3.1.15 IT team shall implement suitable virus and spam control measures to
minimise/reduce the chances of these infesting into the user’s mailbox or
spreading unwanted messages from a user’s mailbox. This will be done
through automatic scan for virus and spam. The findings and infections will
be blocked or quarantined depending on the severity level.
3.1.16 IT team has the right to reject any recovery of Infected/Quarantined emails
that might compromise the system or network.
3.1.17 Entity shall obtain all hardware and software from official corporate sources,
to prevent the introduction of malicious code.
3.1.18 All users shall abide by software copyright laws and shall not obtain, install,
replicate, or use software except as permitted by the software licensing
agreements.
3.1.19 The entity shall use encryption software approved by official corporate
sources.
3.1.20 Users shall not use a software for personal use on the entity information
resources.
3.1.21 User shall use Internet to conduct business duties and tasks. Also, personal
internet use shall be permitted if it does not interfere with user job duty or
tasks.
3.2.1.8 Users shall not download, install, or run security programs or utilities,
which reveal weaknesses in the security of a system.
3.2.1.9 Users shall not log into a server, unless they are authorized, and it is
within the scope of their job/regular duties. For purposes of this
policy, "disruption" includes, but is not limited to, network sniffing,
pinged floods, packet spoofing, denial of service, and forged routing
information for malicious purposes.
3.2.1.11 Users cannot execute any form of network monitoring which will
intercept data not intended for the employee's host unless this
activity is a part of the employee's normal job.
3.2.1.12 Users shall not make copies of system configuration files for their
own, unauthorised use or to provide to other people/users for
unauthorised use.
3.2.1.13 Interfering with or denying service to any user (for example, denial of
service attack).
Acceptable Use Policy Template
3.2.1.19 All broadcast emails and accounts must be approved by the relevant
directorate management.
3.2.1.24 Users shall not post any information of other user/staff on social
media sites without their permission including but not limited to,
names, addresses, photos, videos, email addresses, and phone
numbers.
3.2.1.26 User shall not use their personal user account for businesses
purposes, except if it is authorized by the entity.
3.2.1.28 The user is responsible for evaluating both the appropriateness and
the form of the broadcast emails.
Acceptable Use Policy Template
3.2.1.29 The email service is for the sole use by authorised user. Users are
authorised to access, use, copy, modify or delete files and data only
on their own accounts and/or accounts to which they have been
authorized to access.
3.2.1.30 All the issues related the password to use and access email services
should be in accordance with password policy.
3.2.1.31 The email system is an <entity name> resource, and they are
expected to utilize this for personal use only on a limited scale.
Email will not be used for personal reasons if it may interfere with the
performance of the system or the employee’s employment or other
obligations. All messages and files composed, sent, or received
using entity’s email system are and will remain the property of the
entity.
3.2.1.32 Users will not use the e-mail system to send, receive, store,
redistribute or display emails or files that are illegal or unethical.
3.2.1.33 Users will not alter the date, time, source/destination and/or any
other information that is part of the header information of an email
message.
3.2.1.34 Users are strictly prohibited from using third-party email systems and
storage servers such as Google, Yahoo, and Hotmail etc. to conduct
entity businesses.
4. Exceptions
4.1 All exceptions to this policy shall be explicitly reviewed by the chief of cyber
policies and regulations and approved by the general director of information
security. The exceptions to this policy if any shall be approved and valid for a
specific period and shall be reassessed and re-approved if necessary.
5. Enforcement
5.1 Penalties for breaches of Acceptable Usage Policy will be based on the severity of
the breach but can include:
Loss of access privileges to information assets.
Other actions as deemed appropriate by civil services Bureau
(CSB) rules.
6. Policy Enforcement
6.1 Policy document sponsor and owner: <Head of Cyber Security
Department>.
Acceptable Use Policy Template
6.3 Any violation of this policy may subject the offender to disciplinary action
as per the procedures followed in <entity name>.