Acceptable Use Policy
Version: 7.1-R2 | Effective Date: July 1, 2020
- Document Created: June 20, 2020
- Last Reviewed: February 28, 2025
- Next Review Date: February 2026
- Approved By: Chief Technology Officer
- Policy Owner: Security Officer
3.1 Purpose
This Acceptable Use Policy establishes standards for appropriate and responsible use of Blue Whale Apps’ information technology resources, systems, networks, and communication tools to protect the company, employees, customers, and business partners from legal liability, security risks, reputational damage, and operational disruption.
3.2 Scope
Applies to all users accessing Blue Whale Apps information systems, all computing devices, all uses of organizational networks and communication platforms, all company data, and all access from any location.
3.3 Policy Statements
3.3.1 Acceptable Uses
Information resources are provided primarily for conducting company business. Limited personal use is permitted when it does not interfere with work productivity, consume significant resources, violate policy provisions, create legal liability, or occur during critical work hours when possible.
3.3.2 Prohibited Activities
Strictly prohibited activities include:
- Security Violations: Unauthorized access, circumventing controls, sharing passwords.
- Data Misuse: Accessing confidential information without authorization, removing data without security controls.
- Communication Violations: Sending spam, forging headers, misusing communication platforms.
- Legal and Ethical Violations: Illegal activities, copyright infringement, harassment.
- Inappropriate Content: Sexually explicit material, violent or offensive content.
- Resource Misuse: Excessive personal use, cryptocurrency mining, resource hogging.
- Reputational Risk: Activities that damage the company’s image or trust.
3.3.3 Email and Communication Standards
Professional communication standards include:
- Using respectful and professional language at all times.
- Verifying recipient identity before sending confidential information.
- Using encryption for sensitive external communications.
- Exercising caution with suspicious emails and phishing attempts.
- Managing email responsibly to avoid misuse of company resources.
3.4 Privacy and Monitoring
Users should have no expectation of privacy when using Blue Whale Apps information resources. The company reserves the right to monitor, access, and review all systems, networks, and communications for security, compliance, investigation, and legal purposes.
3.5 Acknowledgment
All personnel are required to sign acknowledgment of this policy upon hire, annually thereafter, and when material changes are implemented.