Forgotten password?

End user cyber security policy (standard)

You can use this standard-length cyber security policy to govern the use of an organisation's information technology systems. The policy may be adapted to cover employees or contractors - or both.

This policy is relatively flexible, with provisions covering such matters as the risks that might arise out of the use of IT systems, password security, software security and updates, security breaches, misuse of company equipment, use of cloud services, and much more. Many of these provisions are optional, so that the policy can easily be adapted to fit the requirements of your organisation.

Unlike the "premium" version of this document, this version does not include provisions relating to: (i) the monitoring of personnel; or (ii) personnel training.

This policy was created and is maintained by Emma Osborn of OCSRC ( in collaboration with Docular.

Ask about this document

End user cyber security policy (standard) contents

  1. Introduction: employee and contractor contribution to security; concerns of company; the need for employees/contractors to be vigilant; providing information on how to keep
    the company
    secure; implementation of the policy; contact for queries ; the policy is part of the contract.
  2. Cyber security requirements: rules about passwords; circumventing security measures; reporting of security breaches; no accessing work systems with personal devices; taking IT equipment off company premises; exchanging data; no use of
    equipment outside network; no personal use of
    equipment; use of public cloud services; removing data from
    premises; installing software onto
    computer or phone; administrator accounts; accessing inappropriate content; use
     VPN away from office; use of equipment in public Wi-Fi networks.
  3. Handling mistakes: handling mistakes in a timely manner; solving the problem; when to report a mistake; details of the mistake to give the security team; mistakes on own device while connected to company's systems; failing to report system misuse.
  4. Consequences of system misuse: actions considered to be misuse of IT systems; consequences of IT system misuse.
  5. Declaration: agreement to abide by 
    ; signature; signature line: first.
End user cyber security policy (standard) document editor previewEnd user cyber security policy (standard) document editor preview
This is a shortened preview of the editor interface; once you create your instance you'll be able to edit the full document in our online editor.
End user cyber security policy (standard) document preview
This is a shortened preview of the DOCX output; once you create your instance you'll be able to download the full document in PDF, HTML, RTF and/or DOCX (Microsoft Word) format.