Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Email And Internet Usage Policy
"I need an Email and Internet Usage Policy for my financial services company with 200 employees in New Zealand, with extra emphasis on data security and client confidentiality requirements."
1. Purpose and Scope: Outlines the objectives of the policy and who it applies to within the organization
2. Definitions: Defines key terms used throughout the policy including 'electronic communications', 'acceptable use', 'prohibited content', etc.
3. General Principles: Overview of the organization's approach to email and internet usage
4. Acceptable Use: Detailed guidelines on permitted use of email and internet systems
5. Prohibited Activities: Specific activities that are forbidden when using company systems
6. Email Usage Guidelines: Specific rules and best practices for email communication
7. Internet Usage Guidelines: Specific rules and best practices for internet use
8. Security Requirements: Security measures and protocols users must follow
9. Privacy and Monitoring: Organization's right to monitor and employee privacy expectations
10. Data Protection: Guidelines for handling sensitive data and compliance with privacy laws
11. Policy Violations: Consequences of policy violations and disciplinary procedures
12. Acknowledgment: Statement of employee understanding and agreement to comply with the policy
1. Remote Work Provisions: Additional guidelines for employees working remotely - include if organization supports remote work
2. Social Media Usage: Guidelines for social media use - include if not covered in a separate social media policy
3. Personal Device Usage (BYOD): Rules for using personal devices - include if organization allows BYOD
4. Industry-Specific Requirements: Additional requirements for regulated industries - include if organization operates in regulated sector
5. Cloud Services Usage: Guidelines for using cloud services - include if organization uses cloud services
6. Video Conferencing Guidelines: Rules for video conferencing - include if organization regularly uses video conferencing
1. Appendix A - Acceptable Use Examples: Detailed examples of acceptable and unacceptable use cases
2. Appendix B - Security Protocols: Detailed security procedures and requirements
3. Appendix C - Password Guidelines: Specific requirements for password creation and management
4. Appendix D - Acknowledgment Form: Form for employees to sign acknowledging policy understanding
5. Appendix E - Incident Report Form: Template for reporting policy violations or security incidents
6. Appendix F - Technical Requirements: Specific technical settings and configurations required
Authors
Technology
Financial Services
Healthcare
Education
Government
Professional Services
Manufacturing
Retail
Telecommunications
Legal Services
Construction
Non-profit
Media and Entertainment
Transportation
Energy
Human Resources
Information Technology
Legal
Compliance
Risk Management
Operations
Information Security
Employee Relations
Administrative Services
Internal Audit
Chief Executive Officer
Chief Information Officer
IT Manager
Human Resources Director
Compliance Officer
Legal Counsel
Department Manager
Team Leader
System Administrator
Security Officer
Privacy Officer
Risk Manager
Operations Manager
Office Manager
Employee Relations Manager
Find the exact document you need
Email And Internet Usage Policy
A New Zealand-compliant workplace policy governing email and internet usage, aligned with local privacy and employment laws.
Acceptable Use Agreement
A New Zealand-compliant agreement defining acceptable use terms for digital services, including user obligations and compliance requirements.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.