IT policies

Acceptable Use Policy

Internet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, storage and web browsing are the properties of the company.  These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations.


Data Security Policy

The protection of data is a critical business requirement.  The company must protect restricted, confidential or sensitive data from loss to avoid reputation damage and to avoid adversely impacting our operations.


Email Usage Policy

Electronic email is pervasively used in almost all industry verticals and is often the primary communication and awareness method within an organization. At the same time, misuse of email can post many legal, privacy and security risks, thus it’s important for users to understand the appropriate use of electronic communications.


Mobile Device Policy

Mobile devices, such as smartphones and tablet computers, are important tools for the organization and their use is supported to achieve business goals.  However mobile devices also represent a significant risk to information security and data security as, if the appropriate security applications and procedures are not applied, they can be a conduit for unauthorised access to the organization’s data and IT infrastructure.  This can subsequently lead to data leakage and system infection.


Social Media Policy

Social Media is the collective term referring to social and professional networking sites ( for example Facebook, LinkedIn ), microblogs ( such as Twitter ), blogs, wikis, boards and other similar online fora and the policy extends to all such sites and incorporates any future developments of such media.