Skip to content

Acceptable Use Policy


Acceptable Use Policy

Document Owner: Pobl Tech Limited (T/A Pobl)

Overview

This policy defines how Pobl systems, devices, networks, and information assets should be used.

Its purpose is to ensure that all systems are used responsibly and securely, protecting the organisation, its team, and its clients from security risks, legal exposure, and operational disruption.

Scope

This policy applies to:

All employees, directors, contractors, and temporary staff
All devices owned or managed by Pobl
All systems, applications, networks, and services used as part of our operations

This includes remote working and access to third-party platforms where Pobl credentials or permissions are used.

Our approach

Pobl systems and resources must be used in a way that is:

Responsible
Secure
Aligned with business purposes

All users are expected to act professionally and to protect systems and information from misuse or unauthorised access.

Use of systems must comply with applicable laws, contractual obligations, and internal policies.

Acceptable use

Acceptable use includes:

Accessing systems and data required to carry out your role
Using approved software, tools, and services
Communicating professionally with colleagues, clients, and partners
Protecting login credentials and access methods
Following information security and data protection policies

Limited personal use may be permitted where it does not:

Interfere with work responsibilities
Introduce security risks
Breach any policies or obligations

Unacceptable use

Unacceptable use includes, but is not limited to:

Sharing passwords or authentication details
Accessing systems or data without authorisation
Installing unauthorised software or tools
Circumventing security controls or monitoring
Using systems for illegal, offensive, or inappropriate activities
Introducing malware or weakening system security
Using personal storage or messaging tools to handle business data without approval

Any activity that risks the confidentiality, integrity, or availability of systems or data is not permitted.

Device and account security

All users are expected to:

Use secure authentication methods where available
Lock devices when unattended
Keep systems and software up to date
Report lost or stolen devices immediately
Ensure personal devices used for work meet agreed security standards
Email and internet use

Email and internet access must be used responsibly.

Users should remain alert to:

Phishing attempts
Suspicious links or attachments
Unusual or unexpected communications

Any potential threats should be reported promptly.

Remote working

When working remotely:

Access must be through approved and secure methods
Work environments should maintain confidentiality
Devices and screens should not be visible to unauthorised individuals

Monitoring and logging

System usage may be logged and monitored for:

Security
Operational performance
Compliance

Monitoring is carried out proportionately and in line with legal requirements.

Reporting concerns

Any suspected misuse, security concerns, or policy breaches should be reported promptly in line with incident reporting procedures.

Reports are handled fairly and without retaliation.

Breach of policy

Failure to comply with this policy may result in:

Access being restricted or removed
Internal action in line with company procedures

Serious breaches may result in further action where required.

Review and maintenance

This policy is reviewed regularly to ensure it remains effective and appropriate.

Governance

The owner of this policy is Senior Management, Pobl Tech Ltd.

Responsibilities

The Document Owner is responsible for:

Ensuring the policy remains accurate and up to date
Approving updates and changes
Ensuring the policy is communicated and applied

Approval

This policy has been reviewed and approved by senior management.

Approval confirms that the policy:

Reflects current working practices
Aligns with legal and contractual obligations
Is appropriate for the scale and nature of services delivered

Review schedule

This document will be reviewed:

At least annually
Following significant changes to systems, services, or regulatory requirements
Following major incidents or material changes in risk
Distribution

This policy is available to relevant staff and can be provided to clients or auditors where required.

Final note

Responsible use of systems is a shared responsibility.

By following this policy, we help ensure that the platforms we rely on remain secure, reliable, and fit for purpose for both our team and our clients.

Ready to turn ideas into bold digital experiences?