What is acceptable use policy (AUP)? - Definition from WhatIs.com (2024)

What is acceptable use policy (AUP)? - Definition from WhatIs.com (1)

By

  • Paul Kirvan

What is an acceptable use policy (AUP)?

An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.

From an information technology (IT) perspective, an AUP states what a user can and cannot do when using computers and computing resources. This applies whether the organization provides the device or it is a personal device that the user provides.

One of the benefits of an AUP is that it spells out acceptable and unacceptable employee behavior and actions. AUPs also provide a company with a legal mechanism to compel compliance, and they describe penalties for noncompliance.

What is acceptable use policy (AUP)? - Definition from WhatIs.com (2)

9 key elements of an acceptable use policy

Internet service providers (ISPs) usually require new customers to sign an AUP. It may be part of a service level agreement (SLA) between the ISP and customer.

The following are nine stipulations that might be included in an ISP's acceptable use policy:

  1. not using the service in violation of any law;
  2. not attempting to disrupt the information security of any computer network -- such as internet use -- or end user;
  3. not posting commercial messages to usenet groups without prior permission;
  4. not sending junk email messages or spam to anyone who doesn't want to receive them;
  5. not attempting to mail bomb a site in order to flood the server;
  6. not attempting to steal intellectual property from the vendor;
  7. requiring users to report any attempt to break into their account;
  8. acknowledging that disciplinary action may be imposed if the AUP is violated; and
  9. noting that the AUP complies with applicable law as applied IT and related issues and may be subject to periodic audits.

A disclaimer is often included in an AUP absolving the organization from responsibility for a data breach, malware or other issue. Statements about when a person is in violation of this policy and when law enforcement might be called in could also be included.

Examples of how AUPs are used

The following are examples of areas where an acceptable use policy could be helpful:

  • Social media. An AUP sets parameters on how employees should use social media sites, often stipulating what should not be discussed about the company and its business.
  • Internet and other system use. Policies usually cover whether an organization's computer systems can be used only for business purposes. They often stipulate whether these resources can be used for personal email or other electronic communications, shopping, playing computer games and gambling.
  • Cybersecurity. An AUP sets rules related to an organization's IT security policies. These include rules around accessing restricted information; changing access data, such as passwords; opening questionable email attachments; using public Wi-Fi services; and using company approved authentication procedures.
  • Non-employee users. Use policies set restrictions on how non-employees can use company information systems and network resources.
  • Accessing private or confidential information. AUPs prevent users from unauthorized access to proprietary or confidential data and unauthorized use of that data.
  • Bring your own device (BYOD). Many organizations allow or require employees to use personal devices for business purposes. However, with BYOD, an AUP is necessary to prevent security issues and misunderstandings about how these devices should be used.

Best practices to ensure AUPs are followed

Signing an acceptable use policy may be required as part of an employment contract. It often happens during the employee onboarding process or as needed with existing employees.

However, employees must be reminded periodically of their responsibility to understand and adhere to the rules spelled out in the AUP. Some best practices that help employees comply with these policies include the following:

  • Work with the company legal department to ensure the AUP addresses issues properly.
  • Have clearly written policies with minimal technical jargon or confusing legal terms.
  • Provide training classes that emphasize the rules included in an AUP.
  • Test employee knowledge, awareness and understanding of an AUP with periodic questionnaires.
  • Ensure that AUP language is periodically reviewed and updated, especially when there is a major change in business operations, such as introducing a new product or a merger, or when an audit is conducted.

BYOD acceptable use policies are becoming common. Find out more about BYOD policy enforcement and creation.

This was last updated in June 2022

Continue Reading About acceptable use policy (AUP)

  • Why a mobile security policy is a must-have corporate policy
  • 5 IT security policy best practices
  • How to create a cloud security policy, step by step
  • Know how to secure your home network while working from home

Related Terms

What is a unique identifier (UID)?
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.Seecompletedefinition
What is LDAP (Lightweight Directory Access Protocol)?
LDAP (Lightweight Directory Access Protocol) is a software protocol used for locating data about organizations, individuals and ...Seecompletedefinition
What is voice recognition and how does it work?
Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and ...Seecompletedefinition
What is acceptable use policy (AUP)? - Definition from WhatIs.com (2024)
Top Articles
Taxability of UPI / E-Wallet Transactions
How Long Does Pepper Spray Last? Does it Expire?
NOAA: National Oceanic & Atmospheric Administration hiring NOAA Commissioned Officer: Inter-Service Transfer in Spokane Valley, WA | LinkedIn
Toa Guide Osrs
Section 4Rs Dodger Stadium
Asian Feels Login
Boomerang Media Group: Quality Media Solutions
Top Financial Advisors in the U.S.
CHESAPEAKE WV :: Topix, Craigslist Replacement
Autozone Locations Near Me
Pollen Count Los Altos
What Is Njvpdi
Valentina Gonzalez Leak
Colts Snap Counts
Mals Crazy Crab
Willam Belli's Husband
Obsidian Guard's Cutlass
Aspen Mobile Login Help
Concordia Apartment 34 Tarkov
EASYfelt Plafondeiland
BMW K1600GT (2017-on) Review | Speed, Specs & Prices
Raz-Plus Literacy Essentials for PreK-6
Qual o significado log out?
Living Shard Calamity
Understanding Gestalt Principles: Definition and Examples
Violent Night Showtimes Near Amc Dine-In Menlo Park 12
Dr Seuss Star Bellied Sneetches Pdf
2004 Honda Odyssey Firing Order
Gopher Hockey Forum
Frank Vascellaro
Craig Woolard Net Worth
The Latest: Trump addresses apparent assassination attempt on X
Fastpitch Softball Pitching Tips for Beginners Part 1 | STACK
Hotel Denizen Mckinney
Soiza Grass
Capital Hall 6 Base Layout
Bozjan Platinum Coins
Here’s how you can get a foot detox at home!
Daily Jail Count - Harrison County Sheriff's Office - Mississippi
The best Verizon phones for 2024
Lyca Shop Near Me
Jail View Sumter
M Life Insider
Reese Witherspoon Wiki
30 Years Of Adonis Eng Sub
Bustednewspaper.com Rockbridge County Va
Tlc Africa Deaths 2021
What is a lifetime maximum benefit? | healthinsurance.org
Mountainstar Mychart Login
German American Bank Owenton Ky
Model Center Jasmin
Who We Are at Curt Landry Ministries
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5996

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.