IT policy template
Recent customers:
Supporting information
This model policy outlines the standards expected of users of Company communication systems, and the action taken in respect of breaches of these standards.

IT policy
1 Overview
1.1 This policy outlines standards regarding the use of the Company's computing and computer based communications capabilities including, but not limited to, electronic mail and Internet systems.
2 Scope
2.1 This policy is applicable to all employees of [company name].
3 General principles
3.1 Equipment and Software
3.1.1 All the computing resources (e.g., equipment, software and telecommunications capabilities) used by the Company to provide computing and network connections throughout the business are considered the property of the Company. Further, they are intended solely for use by the Company's employees to conduct the Company's business, and should not be used for communication of a personal, private or non-business nature, without authorisation from a senior manager.
It is the Company's intention to use only properly licensed software and
Preview limited to 10% only. View the remaining 90% with a purchase.
What is this for?
This IT policy template aims to offer you a versatile and customisable tool, serving as a solid foundation for your needs. Utilise it to ensure consistency, enhance accuracy, and save valuable time.
Adapt it to suit your unique requirements, ensuring efficiency and effectiveness in your HR processes.


Employment law compliance
-
Computer Misuse Act 1990: This legislation addresses unauthorized access to computer systems, unauthorized access to data, and the creation and distribution of malicious software. It helps protect the organization's IT systems and data from unauthorized use and cyberattacks.
-
Data Protection Act 2018 (DPA): The DPA governs the processing and handling of personal data, including employee data. An IT policy should align with the DPA's principles to ensure the proper handling and protection of personal information.
-
General Data Protection Regulation (GDPR): Although it is an EU regulation, GDPR applies to UK organizations. It imposes stricter requirements on the processing of personal data, including employee data, and an IT policy should address GDPR compliance.
-
Electronic Communications Privacy Regulations (ECPR): These regulations cover the use of electronic communications, such as email and telephone communications. An IT policy should address the monitoring and privacy implications of electronic communications within the organization.
-
Human Rights Act 1998: The Human Rights Act incorporates the European Convention on Human Rights (ECHR) into UK law. It includes the right to privacy, which has implications for employee monitoring and data protection in the workplace.
-
Regulation of Investigatory Powers Act 2000 (RIPA): RIPA sets out rules for the interception of communications, surveillance, and data acquisition. An IT policy should align with RIPA when it comes to monitoring employee communications and activities.
-
Copyright, Designs and Patents Act 1988: This legislation governs the use of copyrighted materials, including software and digital content. An IT policy should address copyright compliance and the appropriate use of software and digital assets.
-
Equality Act 2010: This Act protects employees from discrimination and harassment based on protected characteristics. An IT policy should address equal access to IT resources and avoid any discrimination in technology use.
-
Health and Safety at Work Act 1974: Although not solely focused on IT, this legislation includes provisions related to the safety of employees using technology and computer equipment in the workplace.
-
Whistleblowing Policy: An IT policy should reference the organization's whistleblowing policy to encourage employees to report any IT-related concerns or security breaches.