Acceptable Use Policy Training

Learn how to use Grai Technologies Ltd's IT resources securely and responsibly
All staff · 11 sections
🔒 Why This Training Matters
1 / 11

As staff members of Grai Technologies Ltd, we all have a role to play in protecting the organisation's IT resources and data. This training will help you understand the acceptable use policy and how t

Key Takeaway: Understand the importance of following the acceptable use policy
📚 Purpose and Scope
2 / 11
  • The policy applies to all company devices, networks, and data
  • All staff members must comply with the policy
  • Violations may result in disciplinary action, including termination
  • The policy is in place to protect the organisation and its staff members
Key Takeaway: Understand the purpose and scope of the acceptable use policy
🖥️ Acceptable Use
3 / 11
  • Company devices are for business use, with limited personal use permitted
  • Only use approved software, and request exceptions through IT
  • Lock your workstation when away using Windows+L or Cmd+Ctrl+Q
  • Never share your credentials with anyone
Key Takeaway: Understand the guidelines for acceptable use of IT resources
⚠️ Prohibited Activities
4 / 11
  • Accessing or sharing illegal, offensive, or explicit material is prohibited
  • Using company resources for personal financial gain or crypto mining is prohibited
  • Using personal USB devices or unauthorised peripherals is prohibited
  • Bypassing security measures or engaging in prohibited activities is prohibited
Key Takeaway: Understand what activities are prohibited when using IT resources
📊 Data Handling
5 / 11
  • Data is classified into four categories: Public, Internal, Confidential, and Restricted
  • Confidential data should not be stored on personal devices or in the cloud
  • External transfers of confidential data should use approved secure methods
  • Treat uncertain data as Confidential and handle it accordingly
Key Takeaway: Understand how to handle data securely
📧 Email
6 / 11
  • Do not use company email for personal service registration
  • Verify sender identities before clicking on links
  • Report phishing emails using the Report Phish button or security@grai.ie
  • Do not auto-forward email to external addresses
Key Takeaway: Understand how to use email securely
💻 Remote Work
7 / 11
  • Use a VPN to access internal resources when working remotely
  • Do not use public Wi-Fi without a VPN
  • Shield your screen from others in public
  • Never leave devices unattended in public areas
Key Takeaway: Understand how to work remotely securely
🚨 Incident Reporting
8 / 11
  • Report security incidents immediately to security@grai.ie or ext 4400
  • Do not investigate incidents yourself
  • No penalties for good-faith reporting
  • Failure to report incidents is a violation
Key Takeaway: Understand how to report security incidents
🕵️‍♂️ Monitoring
9 / 11
  • The organisation monitors all IT resource use
  • No expectation of privacy on company systems
  • Monitoring helps detect and prevent security incidents
Key Takeaway: Understand that IT resource use is monitored
⚖️ Enforcement
10 / 11
  • The organisation enforces the acceptable use policy
  • Disciplinary procedures apply to policy violations
  • Serious violations may result in severe consequences
Key Takeaway: Understand the consequences of policy violations
✅ Recap and Next Steps
11 / 11
  • Understand the acceptable use policy and its importance
  • Follow guidelines for acceptable use, prohibited activities, and data handling
  • Report incidents and follow incident reporting procedures
  • Understand the consequences of policy violations
Key Takeaway: Recap the key takeaways from the training