ºÚÁÏÊÓÆµ

Email And Internet Usage Policy Template for New Zealand

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Email And Internet Usage Policy

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Email And Internet Usage Policy

"I need an Email and Internet Usage Policy for my financial services company with 200 employees in New Zealand, with extra emphasis on data security and client confidentiality requirements."

Document background
This Email and Internet Usage Policy is essential for organizations operating in New Zealand to establish clear guidelines for electronic communications and internet use in the workplace. The policy addresses the increasing reliance on digital communications while ensuring compliance with New Zealand's legal framework, including privacy laws, employment regulations, and digital communications legislation. It provides comprehensive coverage of acceptable use, security protocols, monitoring practices, and consequences for violations, while protecting both employer and employee interests. The document should be implemented by all organizations providing email and internet access to their workforce, and should be regularly reviewed to maintain alignment with evolving technological landscapes and regulatory requirements.
Suggested Sections

1. Purpose and Scope: Outlines the objectives of the policy and who it applies to within the organization

2. Definitions: Defines key terms used throughout the policy including 'electronic communications', 'acceptable use', 'prohibited content', etc.

3. General Principles: Overview of the organization's approach to email and internet usage

4. Acceptable Use: Detailed guidelines on permitted use of email and internet systems

5. Prohibited Activities: Specific activities that are forbidden when using company systems

6. Email Usage Guidelines: Specific rules and best practices for email communication

7. Internet Usage Guidelines: Specific rules and best practices for internet use

8. Security Requirements: Security measures and protocols users must follow

9. Privacy and Monitoring: Organization's right to monitor and employee privacy expectations

10. Data Protection: Guidelines for handling sensitive data and compliance with privacy laws

11. Policy Violations: Consequences of policy violations and disciplinary procedures

12. Acknowledgment: Statement of employee understanding and agreement to comply with the policy

Optional Sections

1. Remote Work Provisions: Additional guidelines for employees working remotely - include if organization supports remote work

2. Social Media Usage: Guidelines for social media use - include if not covered in a separate social media policy

3. Personal Device Usage (BYOD): Rules for using personal devices - include if organization allows BYOD

4. Industry-Specific Requirements: Additional requirements for regulated industries - include if organization operates in regulated sector

5. Cloud Services Usage: Guidelines for using cloud services - include if organization uses cloud services

6. Video Conferencing Guidelines: Rules for video conferencing - include if organization regularly uses video conferencing

Suggested Schedules

1. Appendix A - Acceptable Use Examples: Detailed examples of acceptable and unacceptable use cases

2. Appendix B - Security Protocols: Detailed security procedures and requirements

3. Appendix C - Password Guidelines: Specific requirements for password creation and management

4. Appendix D - Acknowledgment Form: Form for employees to sign acknowledging policy understanding

5. Appendix E - Incident Report Form: Template for reporting policy violations or security incidents

6. Appendix F - Technical Requirements: Specific technical settings and configurations required

Authors

Alex Denne

Head of Growth (Open Source Law) @ ºÚÁÏÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions





































Clauses




























Relevant Industries

Technology

Financial Services

Healthcare

Education

Government

Professional Services

Manufacturing

Retail

Telecommunications

Legal Services

Construction

Non-profit

Media and Entertainment

Transportation

Energy

Relevant Teams

Human Resources

Information Technology

Legal

Compliance

Risk Management

Operations

Information Security

Employee Relations

Administrative Services

Internal Audit

Relevant Roles

Chief Executive Officer

Chief Information Officer

IT Manager

Human Resources Director

Compliance Officer

Legal Counsel

Department Manager

Team Leader

System Administrator

Security Officer

Privacy Officer

Risk Manager

Operations Manager

Office Manager

Employee Relations Manager

Industries







Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

Email And Internet Usage Policy

A New Zealand-compliant workplace policy governing email and internet usage, aligned with local privacy and employment laws.

find out more

Acceptable Use Agreement

A New Zealand-compliant agreement defining acceptable use terms for digital services, including user obligations and compliance requirements.

find out more

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.