Acceptable Use Policy

Version: 7.1-R2 | Effective Date: July 1, 2020

  • Document Created: June 20, 2020
  • Last Reviewed: February 28, 2025
  • Next Review Date: February 2026
  • Approved By: Chief Technology Officer
  • Policy Owner: Security Officer

3.1 Purpose

This Acceptable Use Policy establishes standards for appropriate and responsible use of Blue Whale Apps’ information technology resources, systems, networks, and communication tools to protect the company, employees, customers, and business partners from legal liability, security risks, reputational damage, and operational disruption.

3.2 Scope

Applies to all users accessing Blue Whale Apps information systems, all computing devices, all uses of organizational networks and communication platforms, all company data, and all access from any location.

3.3 Policy Statements

3.3.1 Acceptable Uses

Information resources are provided primarily for conducting company business. Limited personal use is permitted when it does not interfere with work productivity, consume significant resources, violate policy provisions, create legal liability, or occur during critical work hours when possible.

3.3.2 Prohibited Activities

Strictly prohibited activities include:

  • Security Violations: Unauthorized access, circumventing controls, sharing passwords.
  • Data Misuse: Accessing confidential information without authorization, removing data without security controls.
  • Communication Violations: Sending spam, forging headers, misusing communication platforms.
  • Legal and Ethical Violations: Illegal activities, copyright infringement, harassment.
  • Inappropriate Content: Sexually explicit material, violent or offensive content.
  • Resource Misuse: Excessive personal use, cryptocurrency mining, resource hogging.
  • Reputational Risk: Activities that damage the company’s image or trust.

3.3.3 Email and Communication Standards

Professional communication standards include:

  • Using respectful and professional language at all times.
  • Verifying recipient identity before sending confidential information.
  • Using encryption for sensitive external communications.
  • Exercising caution with suspicious emails and phishing attempts.
  • Managing email responsibly to avoid misuse of company resources.

3.4 Privacy and Monitoring

Users should have no expectation of privacy when using Blue Whale Apps information resources. The company reserves the right to monitor, access, and review all systems, networks, and communications for security, compliance, investigation, and legal purposes.

3.5 Acknowledgment

All personnel are required to sign acknowledgment of this policy upon hire, annually thereafter, and when material changes are implemented.

Read Our Reviews