Acceptable Use Policy Training

Learn how to use Grai Technologies Ltd's IT resources securely and responsibly
All staff · 11 sections
🔒1 / 11

Why This Training Matters

As staff members of Grai Technologies Ltd, you have access to our organisation's IT resources, including devices, networks, and data. It's essential that you use these resources responsibly and securely to protect our organisation's reputation and assets. Failure to comply with our Acceptable Use Policy may result in disciplinary action, including termination. In this training, we'll cover the key points of our policy and what you need to do to stay secure.
📚2 / 11

Purpose and Scope

Our Acceptable Use Policy defines what is acceptable use of our IT resources. It applies to all Company devices, networks, email, cloud services, and data. As staff members, you must comply with this policy. Remember, our IT resources are for business purposes, with limited personal use permitted. Always use your best judgement when using our IT resources.
Understand the policy's purpose and scope
🔒3 / 11

Acceptable Use

When using our IT resources, only use approved software and request exceptions through IT if needed. Always lock your workstation when away using Windows+L or Cmd+Ctrl+Q. Never share your credentials with anyone, as IT will never ask for your password. These simple steps can help prevent security breaches and protect our organisation's data.
Use approved software and protect your credentials
🚫4 / 11

Prohibited Activities

There are certain activities that are strictly prohibited when using our IT resources. These include accessing illegal, offensive, or explicit material, using our resources for personal financial gain or crypto mining, and bypassing firewalls, antivirus, or endpoint detection. Additionally, never use personal USB devices or unauthorised peripherals, engage in peer-to-peer file sharing, or send bulk unsolicited emails. These activities can put our organisation at risk and are strictly prohibited.
Know what's prohibited
📁5 / 11

Data Handling

When handling data, it's essential to classify it correctly as Public, Internal, Confidential, or Restricted. Never store Confidential data on personal devices or cloud services. When transferring data externally, use approved secure methods only. If you're unsure about the classification of data, always treat it as Confidential. Finally, collect printed confidential documents immediately and shred them when done.
Handle data securely
📧6 / 11

Email

When using company email, never register for personal services using your company email address. Always verify the sender's email address before clicking on links. If you receive a phishing email, report it immediately using the Report Phish button or emailing security@grai.ie. Finally, never auto-forward your email to external addresses.
Use company email securely
💻7 / 11

Remote Work

When working remotely, always use a VPN to access internal resources. Never use public Wi-Fi without a VPN. When working in public, shield your screen from others and never leave your devices unattended. These simple steps can help protect our organisation's data and prevent security breaches.
Work remotely securely
🚨8 / 11

Incident Reporting

If you suspect a security incident, such as a phishing email, lost device, or unauthorised access, report it immediately to security@grai.ie or ext 4400. Do not investigate the incident yourself. Remember, there are no penalties for good-faith reporting, and failure to report is a violation of our policy.
Report incidents promptly
🕵️‍♂️9 / 11

Monitoring

Our organisation monitors all IT resource use, and you should not expect any privacy on Company systems. This monitoring helps us detect and prevent security breaches and ensure compliance with our policy.
Understand monitoring
⚠️10 / 11

Enforcement

Our organisation takes compliance with our Acceptable Use Policy seriously. Disciplinary procedures will be applied in cases of non-compliance, and serious violations may result in suspension, termination, or referral to law enforcement.
Understand enforcement
🔒11 / 11

Key Actions

To recap, always use our IT resources responsibly and securely. Use approved software, protect your credentials, and handle data securely. Report incidents promptly, and understand what's prohibited. By following these key actions, you can help protect our organisation's reputation and assets.
Stay secure and responsible
1 / 11