<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://doc.heinfricke.team/index.php?action=history&amp;feed=atom&amp;title=Acceptable_Use_Policy_%28AUP%29</id>
	<title>Acceptable Use Policy (AUP) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://doc.heinfricke.team/index.php?action=history&amp;feed=atom&amp;title=Acceptable_Use_Policy_%28AUP%29"/>
	<link rel="alternate" type="text/html" href="https://doc.heinfricke.team/index.php?title=Acceptable_Use_Policy_(AUP)&amp;action=history"/>
	<updated>2026-04-14T14:56:06Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.0</generator>
	<entry>
		<id>https://doc.heinfricke.team/index.php?title=Acceptable_Use_Policy_(AUP)&amp;diff=364&amp;oldid=prev</id>
		<title>Suraj.mali@heinfricke.team: Created page with &quot;== 1. Purpose == This policy defines the acceptable and unacceptable use of company-provided IT resources, including laptops, networks, email systems, internet access, and software.  The purpose is to ensure responsible usage, protect company data, and maintain a secure and productive work environment. ----  == 2. Scope == This policy applies to all employees, interns, contractors, consultants, and third parties who access company systems, devices, networks, or applicati...&quot;</title>
		<link rel="alternate" type="text/html" href="https://doc.heinfricke.team/index.php?title=Acceptable_Use_Policy_(AUP)&amp;diff=364&amp;oldid=prev"/>
		<updated>2025-11-24T12:52:22Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== 1. Purpose == This policy defines the acceptable and unacceptable use of company-provided IT resources, including laptops, networks, email systems, internet access, and software.  The purpose is to ensure responsible usage, protect company data, and maintain a secure and productive work environment. ----  == 2. Scope == This policy applies to all employees, interns, contractors, consultants, and third parties who access company systems, devices, networks, or applicati...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== 1. Purpose ==&lt;br /&gt;
This policy defines the acceptable and unacceptable use of company-provided IT resources, including laptops, networks, email systems, internet access, and software.&lt;br /&gt;
&lt;br /&gt;
The purpose is to ensure responsible usage, protect company data, and maintain a secure and productive work environment.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 2. Scope ==&lt;br /&gt;
This policy applies to all employees, interns, contractors, consultants, and third parties who access company systems, devices, networks, or applications.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 3. Acceptable Use of Company Systems ==&lt;br /&gt;
&lt;br /&gt;
* Company systems (laptops, email, internet, software, and network resources) must be used &amp;#039;&amp;#039;&amp;#039;primarily for business purposes&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Limited personal use is allowed only if it does not:&lt;br /&gt;
&lt;br /&gt;
– Interfere with work&lt;br /&gt;
&lt;br /&gt;
– Violate any policy&lt;br /&gt;
&lt;br /&gt;
– Consume excessive resources&lt;br /&gt;
&lt;br /&gt;
* Employees must follow all security guidelines, including password protection and MFA.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 4. Prohibited Activities ==&lt;br /&gt;
The following activities are &amp;#039;&amp;#039;&amp;#039;strictly prohibited&amp;#039;&amp;#039;&amp;#039; on company networks and devices:&lt;br /&gt;
&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Accessing inappropriate, illegal, or offensive content&amp;#039;&amp;#039;&amp;#039;, including pornography, pirated material, or extremist content.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Unauthorized downloads or installations&amp;#039;&amp;#039;&amp;#039;, including unlicensed software or unsafe applications.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Bypassing security controls&amp;#039;&amp;#039;&amp;#039;, firewalls, VPN, MFA, or URL filters.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Sharing login credentials&amp;#039;&amp;#039;&amp;#039; or granting access to unauthorized individuals.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Using company resources for personal business&amp;#039;&amp;#039;&amp;#039;, trading, freelancing, or commercial activity.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Engaging in hacking, phishing, or malicious activities&amp;#039;&amp;#039;&amp;#039;, intentionally or unintentionally.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Torrenting, P2P file sharing&amp;#039;&amp;#039;&amp;#039;, or high-bandwidth streaming (except for approved work purposes).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 5. Email &amp;amp; Communication Guidelines ==&lt;br /&gt;
Employees must:&lt;br /&gt;
&lt;br /&gt;
* Use official company email only for business communication.&lt;br /&gt;
* Not send confidential data to personal emails.&lt;br /&gt;
* Not forward spam, hoax messages, or chain mails.&lt;br /&gt;
* Avoid opening suspicious attachments or links.&lt;br /&gt;
* Communicate professionally in all official channels (Outlook, Teams, Odoo, etc.).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 6. Data Protection &amp;amp; Security ==&lt;br /&gt;
&lt;br /&gt;
* Sensitive company information must be stored only on &amp;#039;&amp;#039;&amp;#039;authorized platforms&amp;#039;&amp;#039;&amp;#039; (OneDrive, SharePoint, Odoo).&lt;br /&gt;
* Copying, transferring, or storing company data on personal devices/cloud accounts is prohibited.&lt;br /&gt;
* Employees must comply with password policies and use MFA.&lt;br /&gt;
* Any suspected security incident must be reported immediately to IT.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 7. Internet Usage Policy ==&lt;br /&gt;
Business network (Hein+Fricke) must be used only for official work.  &lt;br /&gt;
&lt;br /&gt;
* Personal devices must connect only to &amp;#039;&amp;#039;&amp;#039;H+F_Guest&amp;#039;&amp;#039;&amp;#039; Wi-Fi.&lt;br /&gt;
* The following are not permitted:&lt;br /&gt;
&lt;br /&gt;
– Streaming movies/games&lt;br /&gt;
&lt;br /&gt;
– Large non-business downloads&lt;br /&gt;
&lt;br /&gt;
– Social media misuse&lt;br /&gt;
&lt;br /&gt;
– Visiting unauthorized or harmful websites&lt;br /&gt;
&lt;br /&gt;
The company may block or restrict websites as needed for security.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 8. Software &amp;amp; Application Usage ==&lt;br /&gt;
&lt;br /&gt;
* Only licensed and IT-approved software may be used.&lt;br /&gt;
* Employees must not modify system configurations, install incompatible tools, or disable antivirus/security settings.&lt;br /&gt;
* All updates must be allowed and applied promptly.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 9. Monitoring &amp;amp; Compliance ==&lt;br /&gt;
&lt;br /&gt;
* The company may monitor internet usage, email logs, and system activity for security and compliance.&lt;br /&gt;
* Any violation may result in warnings, access restrictions, HR action, or termination depending on the severity.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 10. Policy Review ==&lt;br /&gt;
This policy will be reviewed annually and updated as required to meet legal, security, and business requirements.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== 11. Acknowledgement ==&lt;br /&gt;
Employees must sign the &amp;#039;&amp;#039;&amp;#039;Acceptable Use Acknowledgement Form&amp;#039;&amp;#039;&amp;#039; confirming they have read, understood, and agreed to follow this policy.&lt;/div&gt;</summary>
		<author><name>Suraj.mali@heinfricke.team</name></author>
	</entry>
</feed>