Demo · sample data, not for production use · request the real tool →

Acceptable Use Policy

Defines permitted and prohibited use of company systems, devices, networks, and data by all personnel.

SecurityPublished

Current version · v2.4

Effective 11/1/2025 — approved by CEO

Acceptable Use Policy

1. Purpose

This acceptable use policy establishes the requirements, responsibilities, and expectations governing how AC5 Labs Demo Co protects information assets, manages risk, and meets its contractual and regulatory obligations. It applies to all employees, contractors, interns, and third parties acting on behalf of the company.

2. Scope

This policy covers all information systems, devices, networks, facilities, and data — whether owned, leased, or operated under contract — that are used to conduct company business. It applies regardless of location and includes remote work, customer environments, and bring-your-own-device arrangements.

3. Roles & Responsibilities

The CISO owns this policy and is accountable for its content, approval cycle, and exceptions. Department heads are responsible for operationalizing the policy within their teams and ensuring relevant personnel attest within thirty (30) days of hire and annually thereafter.

4. Policy Statements

4.1 The company shall maintain documented controls aligned with the cross-referenced framework requirements listed at the end of this policy.

4.2 Exceptions to this policy must be requested in writing, justified by a documented business need, time-bound, and approved by the policy owner. All approved exceptions shall be logged and reviewed at least annually.

4.3 Violations of this policy may result in disciplinary action up to and including termination of employment or contract, and where applicable, civil or criminal penalties.

5. Compliance & Enforcement

Compliance is verified through periodic internal audits, automated control testing where feasible, and external assessment as part of the company's overall compliance program. Non-conformities will be tracked through the corrective action process and reported to executive leadership monthly.

6. Review

This policy is reviewed at least annually, or sooner if material changes occur in the business, technology environment, or applicable regulations. The reviewer captures changes in the version history and re-attestation is required when a substantive update is published.

Document control: POL-IS-002 v2.4 · Approved per the version history below.

Version history

3 versions on record

  1. v2.4current
    11/1/2025

    Added rules for generative AI and personal-account use of company data.

    Approved by CEO

  2. v2.3obsolete
    10/12/2024

    Annual refresh; added remote-work device hygiene requirements.

    Approved by CEO

  3. v2.2obsolete
    9/30/2023

    Aligned with updated DLP capabilities.

    Approved by CEO

Status
Published
Version
v2.4
Effective
11/1/2025
Next review
11/1/2026
On track

Attestation status

Completed9/11 (82%)

Cross-references

Related framework controls

ISO 27001 A.5.10SOC 2 CC6.1NIST 800-171 3.1.20

Distribution list

Owner: CISO

  • All employees
    Last reminded 3/10/2026
    142
  • Contractors
    Last reminded 3/10/2026
    18
  • Interns
    Last reminded 4/22/2026
    6