Acceptable Use Policies: Everything You Need To Know!
Acceptable use policies are crucial documents for organizations, outlining the appropriate and ethical use of resources. These policies are directly related to cybersecurity frameworks, which aim to protect digital assets. Effective IT departments typically develop and enforce acceptable use policies as part of a broader governance strategy. Furthermore, employee training programs are essential for ensuring that individuals understand and adhere to these guidelines, minimizing potential risks and fostering a culture of responsible technology use. The goal of acceptable use policies is simple: they ensure that all digital assets are used responsibly and ethically.
In an era defined by digital interconnectedness, organizations face unprecedented opportunities and challenges. The internet, while a powerful tool for communication and productivity, also presents significant risks to data security, network integrity, and legal compliance.
To navigate this complex landscape effectively, businesses and institutions rely on a crucial instrument: the Acceptable Use Policy (AUP).
Defining an Acceptable Use Policy (AUP)
An Acceptable Use Policy (AUP) is a document outlining the rules and regulations for the proper use of an organization’s technology resources. These resources encompass a wide range of assets, including computer systems, networks, software, internet access, email accounts, and mobile devices.
The primary purpose of an AUP is to protect an organization’s assets. It also clearly defines acceptable and unacceptable behaviors for all users. This includes employees, contractors, students, or any individual granted access to the organization’s digital infrastructure.
A well-crafted AUP specifies what activities are permitted and prohibited. It may address topics such as:
- Appropriate internet browsing habits
- Use of company email
- Software installation guidelines
- Data security protocols
- Social media conduct
- Personal use of company devices
The Crucial Role of AUPs in Modern Digital Environments
In today’s increasingly digital world, the significance of AUPs cannot be overstated. They serve as a critical line of defense against various threats and risks.
Data breaches, malware infections, and cyberattacks can have devastating consequences for organizations of all sizes. An AUP helps mitigate these risks by educating users about potential threats and establishing clear guidelines for responsible technology use.
Beyond security, AUPs play a vital role in ensuring legal compliance. Organizations must adhere to various regulations, such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other industry-specific laws. An AUP can help organizations demonstrate their commitment to data protection and privacy, reducing the risk of legal penalties.
Furthermore, an AUP promotes a culture of responsibility and accountability within the organization. By setting clear expectations for technology use, it empowers users to make informed decisions and avoid behaviors that could jeopardize the organization’s security or reputation.
In summary, an Acceptable Use Policy is an indispensable tool for any organization operating in the modern digital environment. It safeguards assets, ensures legal compliance, manages risks, and fosters a culture of responsible digital behavior.
An AUP, therefore, is more than just a set of rules; it’s a foundational element of a strong security strategy. By clearly outlining expectations and acceptable behaviors, an AUP becomes a proactive measure rather than a reactive response to digital incidents. Let’s now explore the tangible business benefits that organizations gain by implementing a comprehensive Acceptable Use Policy.
Why Implement an AUP? Key Business Benefits
The implementation of an Acceptable Use Policy (AUP) translates into a multitude of benefits for organizations. These benefits span from tangible asset protection to intangible gains in reputation and operational efficiency.
A well-defined AUP acts as a shield, safeguarding critical business resources, ensuring adherence to legal mandates, mitigating potential risks, and elevating the overall cybersecurity defenses of the organization.
Protecting Assets: A Multi-Faceted Approach
One of the primary justifications for implementing an AUP is its ability to protect an organization’s valuable assets. These assets extend beyond physical property and encompass intangible digital resources that are vital to operations.
The AUP functions as a proactive defense against a range of threats, including:
-
Data Breaches: An AUP can enforce strong password policies, restrict unauthorized software installations, and regulate data access to prevent sensitive information from falling into the wrong hands.
-
Copyright Infringement: By outlining acceptable usage of copyrighted materials and prohibiting illegal downloads, the AUP helps prevent potential legal repercussions arising from intellectual property violations.
-
Malware Infections: An AUP can prohibit the downloading of suspicious files and restrict access to potentially malicious websites. This reduces the risk of malware infecting the organization’s systems.
Safeguarding Network and Data Security
The modern business network serves as the central nervous system of the organization, connecting employees, applications, and data. Protecting this network from unauthorized access and ensuring the confidentiality, integrity, and availability of data is paramount.
An AUP plays a vital role in:
-
Preventing Unauthorized Access: By defining who can access specific data and systems, the AUP limits the attack surface and prevents malicious actors from gaining a foothold.
-
Protecting Sensitive Data: The policy can enforce encryption protocols, restrict the storage of sensitive data on personal devices, and outline secure data handling procedures.
These are critical steps in safeguarding valuable company information.
Ensuring Legal Compliance
Organizations operate within a complex web of regulations, and failure to comply can result in significant fines, legal action, and reputational damage. An AUP helps organizations navigate this complex landscape by outlining acceptable data handling practices and ensuring adherence to relevant laws.
Key regulations often addressed by AUPs include:
-
GDPR (General Data Protection Regulation): The AUP can address data privacy requirements. It helps organizations demonstrate their commitment to protecting personal data.
-
CCPA (California Consumer Privacy Act): Similar to GDPR, the AUP can outline procedures for handling consumer data in compliance with CCPA regulations.
By incorporating these and other relevant regulations into the AUP, organizations can reduce the risk of legal penalties and maintain a positive reputation.
Managing Risk: Reducing Liability and Disruptions
Risk management is an essential aspect of business operations. An AUP contributes to this effort by identifying and mitigating potential risks associated with technology usage.
This includes:
-
Reducing Legal Liability: By establishing clear guidelines for acceptable online behavior, the AUP helps protect the organization from legal claims arising from employee actions, such as harassment or defamation.
-
Mitigating Operational Disruptions: The policy can address issues like bandwidth usage, system downtime, and data loss. This minimizes disruptions to business operations.
An AUP provides a framework for responsible technology usage, reducing the likelihood of costly incidents and ensuring business continuity.
Enhancing Cybersecurity Posture
A strong cybersecurity posture is no longer optional. It is a fundamental requirement for organizations to thrive in the digital age. An AUP is a crucial component of a comprehensive cybersecurity strategy.
The AUP enhances cybersecurity by:
-
Educating Users: It provides users with the knowledge they need to identify and avoid potential threats, such as phishing scams and malware.
-
Enforcing Security Best Practices: The policy can enforce security measures such as strong passwords, multi-factor authentication, and regular software updates.
-
Promoting a Security-Conscious Culture: It fosters a culture of shared responsibility for security, where users understand their role in protecting organizational assets.
Clarifying Expectations for Appropriate Internet Usage
Unclear expectations regarding internet usage can lead to misuse, reduced productivity, and potential security risks. An AUP eliminates ambiguity by explicitly outlining acceptable and unacceptable internet activities.
This includes:
-
Defining Acceptable Browsing Habits: The AUP can restrict access to inappropriate websites and prohibit activities such as gambling or streaming copyrighted content.
-
Regulating Social Media Usage: It can outline guidelines for employee social media activity. This ensures that employees represent the organization professionally online.
-
Addressing Personal Use of Company Devices: The policy can define the extent to which employees can use company devices for personal purposes. This prevents potential conflicts of interest and security risks.
By clarifying these expectations, organizations can promote responsible internet usage and minimize the risks associated with online activities.
An AUP, therefore, is more than just a set of rules; it’s a foundational element of a strong security strategy. By clearly outlining expectations and acceptable behaviors, an AUP becomes a proactive measure rather than a reactive response to digital incidents. Let’s now explore the tangible business benefits that organizations gain by implementing a comprehensive Acceptable Use Policy.
Core Components of a Strong AUP
The true strength of an Acceptable Use Policy lies in its comprehensive nature. It’s not enough to simply state that employees should "be responsible" online. A robust AUP dives into specifics, addressing a wide array of potential issues and offering clear guidance.
A strong AUP will include several crucial components, acting as a guiding light and a shield for both the organization and its employees. Let’s break down the essential elements.
Acceptable and Unacceptable Internet Usage
This section forms the bedrock of any AUP. It clearly defines what constitutes acceptable and unacceptable use of the organization’s internet connection.
Acceptable use might include activities directly related to job duties, professional development, or brief, reasonable personal use during breaks.
Unacceptable use, on the other hand, typically encompasses activities like accessing inappropriate content, engaging in illegal activities, or excessive personal use that hinders productivity.
This section should also address the use of bandwidth-intensive applications and file-sharing programs. Be as explicit as possible to eliminate ambiguity and prevent misunderstandings.
Employee Monitoring and Data Privacy
Employee monitoring is a sensitive area that requires careful consideration. The AUP must clearly outline the organization’s monitoring practices, including the types of data collected, the purpose of the monitoring, and the methods used.
Transparency is key here. Employees should be informed about what is being monitored and why. This builds trust and reduces the likelihood of resentment.
Furthermore, the AUP must address data privacy concerns, ensuring that the organization complies with all applicable laws and regulations, such as GDPR or CCPA.
Striking a balance between security and privacy is crucial to maintaining a positive work environment.
Network Security and Device Usage Policies
This section details the rules and guidelines for accessing and using the organization’s network and devices. It should cover topics such as:
- Password requirements: Strong passwords, regular password changes, and prohibitions against sharing passwords.
- Device security: Requirements for installing antivirus software, enabling firewalls, and keeping operating systems up to date.
- Remote access: Guidelines for accessing the network remotely, including the use of VPNs and multi-factor authentication.
- Acceptable devices: Identifying what devices can and can not be used on company networks.
It should also address the use of personal devices on the company network (Bring Your Own Device or BYOD policies), outlining any restrictions or requirements for these devices.
Social Media, Email, and Software Installation Guidelines
The AUP should provide clear guidelines for using social media, email, and software on company devices and networks.
Social Media: This section should address appropriate online behavior, prohibiting the sharing of confidential information or disparaging remarks about the company or its employees.
Email: The AUP should outline acceptable email etiquette, including guidelines for avoiding phishing scams, protecting sensitive information, and using company email for personal purposes.
Software Installation: This part of the AUP should restrict the installation of unauthorized software, which can introduce malware or create security vulnerabilities.
All software installations should be approved by the IT department to ensure compatibility and security.
Legal Compliance and Legal Counsel Input
Legal compliance is paramount. The AUP must be consistent with all applicable laws and regulations, including data privacy laws, employment laws, and intellectual property laws.
Involving legal counsel in the creation and review of the AUP is essential to ensure compliance and minimize legal risks. Legal counsel can provide guidance on specific legal requirements and help to draft language that is clear, concise, and enforceable.
Regular legal review is also important, as laws and regulations can change over time. Staying up-to-date on the latest legal developments will help to ensure that the AUP remains compliant and effective.
Stakeholder Roles and Responsibilities in Upholding the AUP
An Acceptable Use Policy doesn’t function in isolation; its effectiveness hinges on the active participation of various stakeholders within the organization. Each group brings unique expertise and assumes specific responsibilities in ensuring the AUP is understood, adhered to, and consistently enforced.
Employer and Employee Responsibilities
At its core, the AUP defines a shared understanding between employer and employee regarding acceptable digital behavior. Employers have a fundamental responsibility to clearly communicate the AUP, making it readily accessible and providing adequate training to ensure employees understand its implications.
Furthermore, employers must foster a culture of compliance, leading by example and demonstrating a commitment to ethical and secure digital practices.
Employees, on the other hand, are obligated to familiarize themselves with the AUP and adhere to its guidelines in their daily activities. This includes understanding the acceptable use of company resources, safeguarding confidential information, and reporting any suspected violations of the policy.
Ultimately, employees are the first line of defense in upholding the AUP.
The Crucial Role of Internal Departments
Several key departments play a vital role in the creation, implementation, and enforcement of the AUP. Their collaboration is essential for ensuring the policy is comprehensive, legally sound, and effectively managed.
Legal Department: Ensuring Compliance and Minimizing Risk
The legal department’s primary responsibility is to ensure the AUP complies with all applicable laws and regulations, including data privacy laws like GDPR and CCPA.
They provide guidance on the legal implications of employee monitoring, data security, and intellectual property protection. The legal team also plays a critical role in mitigating potential legal liabilities associated with AUP violations.
IT Department: Implementing and Monitoring Security Measures
The IT department is responsible for implementing the technical controls necessary to enforce the AUP. This includes implementing firewalls, intrusion detection systems, and other security measures to prevent unauthorized access and protect sensitive data.
They also play a key role in monitoring employee internet usage, identifying potential security threats, and investigating AUP violations.
The IT department is instrumental in updating and maintaining the technical infrastructure that supports the AUP.
Human Resources (HR) Department: Policy Enforcement and Employee Relations
The HR department is responsible for communicating the AUP to employees, providing training on its requirements, and addressing employee concerns related to the policy.
They are also involved in investigating AUP violations and implementing disciplinary actions in accordance with company policy. HR plays a crucial role in ensuring the AUP is applied fairly and consistently across the organization.
Enforcing the AUP: Training, Monitoring, and Disciplinary Actions
Effective AUP enforcement requires a multi-pronged approach, combining proactive measures with reactive responses to violations.
Training and Awareness
Regular training programs are essential for educating employees about the AUP and its requirements. These programs should cover topics such as acceptable internet usage, data security best practices, and the potential consequences of AUP violations.
Training should be tailored to different roles and responsibilities within the organization.
Monitoring and Auditing
Organizations should implement monitoring and auditing mechanisms to detect potential AUP violations. This may include monitoring employee internet usage, reviewing system logs, and conducting security audits.
However, monitoring activities must be conducted in a manner that respects employee privacy and complies with applicable laws.
Disciplinary Actions and Remediation
Clear disciplinary procedures should be established for addressing AUP violations. These procedures should outline the range of potential consequences, from verbal warnings to termination of employment, depending on the severity of the violation.
In addition to disciplinary actions, organizations should implement remediation measures to address the root causes of AUP violations and prevent future occurrences. This may involve updating security policies, providing additional training, or implementing new technical controls.
Legal and Ethical Considerations in Acceptable Use Policies
The creation and implementation of an Acceptable Use Policy (AUP) is not solely a technical or security exercise. It delves into complex legal and ethical terrain that demands careful navigation. Successfully deploying an AUP requires organizations to thoughtfully balance their legitimate business interests with the fundamental rights and expectations of their employees.
Balancing Employee Monitoring and Privacy Rights
One of the most sensitive areas within an AUP is the extent to which employee activity is monitored. While organizations have a valid need to protect their assets, networks, and data, constant surveillance can erode trust and negatively impact employee morale.
Organizations must clearly articulate the specific reasons for monitoring, the types of data being collected, and how that data will be used and secured. Transparency is paramount. Employees should be informed about the monitoring practices in place and provided with a clear understanding of their rights.
Thought should also be given to proportionality. Is the level of monitoring commensurate with the perceived risk? Are there less intrusive methods that could achieve the same objectives? A blanket approach to monitoring, without considering individual roles or access levels, can be seen as heavy-handed and unethical.
Ensuring Compliance with Data Privacy Regulations
AUPs must be meticulously crafted to comply with a growing web of data privacy regulations, including the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). These laws grant individuals significant rights over their personal data, including the right to access, correct, and delete their information.
An AUP should clearly outline how the organization collects, processes, and stores employee data, ensuring it aligns with the principles of data minimization, purpose limitation, and storage limitation. Data should only be collected for specific, legitimate purposes and retained only as long as necessary.
Furthermore, the AUP should address the rights of employees under these regulations. This includes informing them about their rights, providing mechanisms for exercising those rights, and ensuring that data is handled in a secure and confidential manner. Failure to comply with these regulations can result in significant fines and reputational damage.
Addressing Personal Internet Usage
The line between personal and professional use of company devices and networks is increasingly blurred. Many employees use company resources for personal tasks, such as checking email or browsing social media.
An AUP must clearly define the acceptable limits of personal Internet usage. While a complete ban may be impractical and detrimental to employee morale, uncontrolled personal use can pose security risks and negatively impact productivity.
The policy should address issues such as accessing inappropriate content, downloading unauthorized software, and engaging in activities that could compromise network security. It should also clarify whether personal data stored on company devices is subject to monitoring or access.
Integration with Other Policies
An AUP does not exist in a vacuum. It should be carefully integrated with other organizational policies, such as the Privacy Policy, Terms of Service, and User Agreement.
The Privacy Policy should explain how the organization collects, uses, and protects personal data, both from employees and customers. The Terms of Service may outline the rules for using specific company services or platforms. The User Agreement could set out the conditions for accessing and using company resources.
Ensuring consistency across these policies is crucial for avoiding confusion and minimizing legal risk. The AUP should reference these other policies where appropriate and clearly define the relationship between them. This holistic approach to policy development helps to create a comprehensive framework for responsible digital behavior within the organization.
Ensuring compliance with regulations like GDPR and CCPA are paramount; however, the true impact of any AUP is determined by how effectively it’s brought to life within an organization. A well-crafted policy is only as good as its implementation. Therefore, let’s look at a step-by-step guide to creating and implementing an effective AUP.
Creating and Implementing an Effective AUP: A Step-by-Step Guide
Crafting an Acceptable Use Policy isn’t merely about ticking boxes; it’s about shaping behavior and fostering a culture of digital responsibility. A systematic approach ensures that the AUP is not only comprehensive but also effectively integrated into the organization’s daily operations.
Assembling Your AUP Dream Team: Involving Key Stakeholders
The creation of an AUP shouldn’t be a solitary endeavor undertaken by the IT department alone. Collaboration is key.
A cross-functional team brings diverse perspectives and ensures comprehensive coverage. The Legal Department ensures compliance, the IT Department offers technical expertise, Human Resources addresses employee relations, and senior management provides strategic alignment.
Each stakeholder brings unique insights:
-
Legal Department: Provides expertise on relevant laws and regulations, ensuring the AUP is legally sound and enforceable.
-
IT Department: Offers technical guidance on network security, data protection, and monitoring capabilities.
-
Human Resources (HR) Department: Contributes insights on employee behavior, communication strategies, and disciplinary procedures.
-
Senior Management: Provides strategic direction, ensures alignment with business objectives, and champions the AUP’s implementation.
By involving these key stakeholders from the outset, you create a policy that is not only legally compliant and technically sound but also practical and employee-friendly.
Getting the Message Across: Communicating the Policy Clearly to Employees
A well-written AUP is useless if employees don’t understand it. Clarity is paramount.
The policy should be written in plain language, avoiding technical jargon and legal complexities. Visual aids, such as infographics or videos, can help to explain complex concepts in an accessible manner.
Multiple channels should be used to communicate the AUP, including email, intranet postings, and in-person presentations. Make sure to:
-
Use clear and concise language.
-
Provide examples of acceptable and unacceptable behavior.
-
Offer multiple channels for communication.
-
Encourage questions and feedback.
Regular communication reinforces the AUP’s importance and keeps it top-of-mind for employees.
Training for Success: Empowering Employees with Knowledge
Communication is not enough; training is essential. Employees need to understand not only what the AUP says but also why it matters.
Training should cover network security best practices, data protection protocols, and legal compliance requirements. Interactive sessions, quizzes, and real-world scenarios can enhance engagement and retention.
-
Network Security Training: Equip employees with the knowledge to identify and avoid phishing scams, malware, and other cyber threats.
-
Data Protection Training: Educate employees on data privacy regulations, proper data handling procedures, and the importance of safeguarding sensitive information.
-
Legal Compliance Training: Ensure employees understand their obligations under relevant laws, such as GDPR and CCPA.
By providing comprehensive training, organizations empower employees to make informed decisions and act responsibly in the digital realm.
Staying Relevant: Regularly Reviewing and Updating the AUP
The digital landscape is constantly evolving. New technologies emerge, cyber threats evolve, and regulations change. An AUP is not a static document.
It should be reviewed and updated regularly to reflect these changes. At a minimum, organizations should review their AUP annually, but more frequent reviews may be necessary depending on the pace of technological change and the evolving threat landscape.
Key triggers for AUP updates include:
-
New technologies or platforms being introduced.
-
Changes in legal or regulatory requirements.
-
Emergence of new cyber threats or security vulnerabilities.
-
Feedback from employees or stakeholders.
By regularly reviewing and updating the AUP, organizations can ensure that it remains relevant, effective, and aligned with their evolving needs and priorities. This proactive approach helps to mitigate risks, protect assets, and foster a culture of digital responsibility.
Ensuring compliance with regulations like GDPR and CCPA are paramount; however, the true impact of any AUP is determined by how effectively it’s brought to life within an organization. A well-crafted policy is only as good as its implementation. Therefore, let’s look at a step-by-step guide to creating and implementing an effective AUP.
Addressing Violations and Enforcement Strategies
An Acceptable Use Policy, however comprehensive, is only as effective as its enforcement. Clear procedures for reporting, addressing, and mitigating violations are crucial to maintain a secure and compliant digital environment. Without a well-defined enforcement strategy, the AUP becomes merely a document, not a deterrent.
Establishing Clear Reporting Mechanisms
A robust reporting mechanism is the first line of defense against AUP violations. Employees need a clear, accessible, and confidential means to report suspected breaches without fear of reprisal.
Multiple channels should be available, such as:
- A dedicated email address (e.g.,
[email protected]
). - An online reporting form accessible through the company intranet.
- A designated contact person within the IT or HR department.
The reporting process must be clearly outlined in the AUP, including what constitutes a reportable violation, what information should be included in the report, and who will handle the investigation. Anonymity options should be considered to encourage reporting of sensitive issues.
Specific Violation Reporting Procedures
The reporting procedure must be tailored to specific incidents such as:
-
Data Breaches: Immediate reporting to the IT department and data protection officer (if applicable) is crucial. The report should include details of the suspected breach, the data potentially compromised, and any known impact.
-
Copyright Infringement: Reports should include details of the infringing material, the location where it was found, and any individuals involved. The legal department should be notified immediately to assess potential legal liabilities.
-
Malware Incidents: Employees should immediately report any suspected malware infections, including details of the affected device, the suspected source of the malware, and any unusual system behavior. The IT department should then isolate the device and initiate remediation procedures.
Implementing Disciplinary Actions for Policy Breaches
Disciplinary actions are a critical component of AUP enforcement. The AUP should clearly outline the range of potential consequences for violations, which may include:
- Verbal warnings.
- Written warnings.
- Suspension of network access.
- Mandatory training.
- Termination of employment.
The severity of the disciplinary action should be commensurate with the nature and impact of the violation. A minor infraction, such as occasional personal use of company internet, might warrant a verbal warning.
In contrast, a serious breach, such as intentional data theft, would likely result in immediate termination. It’s vital to ensure that disciplinary actions are applied consistently and fairly across the organization to avoid accusations of bias or discrimination.
Clear documentation of all disciplinary actions is essential for legal compliance and to provide a record of AUP enforcement. Consultation with the HR and legal departments is highly recommended before taking any disciplinary action.
Responding to Security Incidents and Mitigating Risks
AUP violations can often lead to security incidents. A well-defined incident response plan is essential to mitigate the impact of these incidents and prevent future occurrences. The incident response plan should outline the steps to be taken when a security incident is detected, including:
- Identification: Quickly identify the nature and scope of the incident.
- Containment: Isolate the affected systems or data to prevent further damage.
- Eradication: Remove the threat and restore systems to a secure state.
- Recovery: Restore data from backups and resume normal operations.
- Lessons Learned: Conduct a post-incident review to identify the root cause of the incident and implement preventative measures.
Risk mitigation should be an ongoing process. Regular security audits, vulnerability assessments, and penetration testing can help identify weaknesses in the network and systems. Employee training programs should be updated regularly to address emerging threats and reinforce safe computing practices. Furthermore, the AUP itself should be reviewed and updated periodically to address new risks and technologies.
FAQs About Acceptable Use Policies
Have more questions about acceptable use policies? Check out these common questions and answers:
What’s the main purpose of an acceptable use policy?
An acceptable use policy (AUP) clearly outlines the rules and expectations for how users should behave when using a service, network, or website. It’s primary purpose is to protect the service provider and other users from misuse, abuse, or illegal activities.
What are some common topics covered in acceptable use policies?
Acceptable use policies frequently address prohibited activities like hacking, spamming, distributing malware, or violating copyright laws. They also commonly cover acceptable levels of resource usage, data privacy guidelines, and consequences for violations.
How do acceptable use policies benefit users?
While an acceptable use policy sets rules, it also benefits users by ensuring a safe and reliable environment. By preventing abuse and misuse, these policies help maintain network performance, protect user data, and promote a positive online experience.
What happens if I violate an acceptable use policy?
The consequences for violating an acceptable use policy vary depending on the severity of the offense. Actions can range from a warning or temporary suspension of service to permanent account termination and, in some cases, legal action. Make sure you are aware of and understand the acceptable use policies of the services you use.
So, now you’re in the know about acceptable use policies! Time to go forth and use your newfound wisdom. If you ever wonder what’s considered acceptable use, just remember the basics – and maybe re-read this article. Happy and safe browsing!