Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Acceptable Use Policy Agreement
"I need an Acceptable Use Policy Agreement for my software development company in Bangalore, India, which will be implementing new cloud-based development tools by March 2025 - the policy should especially focus on data security and remote access protocols."
1. Parties: Identification of the service provider and the user/organization to whom the policy applies
2. Background: Context of the agreement and purpose of the AUP
3. Definitions: Clear definitions of technical terms, services, and key concepts used throughout the policy
4. Scope of Services: Description of the systems, networks, and services covered by the policy
5. General Usage Rules: Basic rules and expectations for system and network usage
6. Prohibited Activities: Detailed list of forbidden actions and behaviors
7. Security Requirements: User obligations regarding security measures and practices
8. Data Protection and Privacy: Rules regarding data handling and privacy compliance
9. Monitoring and Enforcement: Details of how usage is monitored and policy enforcement
10. Consequences of Violation: Actions taken in response to policy violations
11. Limitation of Liability: Extent and limitations of service provider's liability
12. Term and Termination: Duration of policy applicability and termination conditions
13. Governing Law: Specification of Indian law application and jurisdiction
1. Industry-Specific Compliance: Additional requirements for specific industries (e.g., healthcare, financial services)
2. Third-Party Access: Rules for third-party access to systems and services, used when external contractors or vendors are involved
3. Data Backup and Recovery: Specific requirements for data backup and recovery procedures, important for data-critical operations
4. Emergency Procedures: Special procedures during emergencies or system outages, relevant for critical services
5. International Usage: Additional terms for international users, needed when services extend beyond India
6. Service Level Commitments: Specific service level agreements and commitments, useful for premium or enterprise services
1. Schedule A - Technical Requirements: Detailed technical specifications and minimum requirements for system usage
2. Schedule B - Prohibited Activities Examples: Specific examples and scenarios of prohibited activities
3. Schedule C - Security Standards: Detailed security protocols and standards to be followed
4. Schedule D - Incident Response Procedures: Step-by-step procedures for handling security incidents
5. Schedule E - Fee Schedule: Details of any fees or charges for policy violations or additional services
6. Appendix 1 - Acceptable Use Guidelines: User-friendly guidelines and best practices for system usage
7. Appendix 2 - Reporting Forms: Standard forms for reporting violations or security incidents
Authors
Access Credentials
Authorized User
Bandwidth
Company Resources
Confidential Information
Content
Cyber Security Incident
Data
Digital Assets
Electronic Communication
Emergency Maintenance
End User
Information Security
Information Systems
Intellectual Property Rights
Internet Facilities
Malicious Code
Network Infrastructure
Network Resources
Personal Data
Prohibited Content
Protected Information
Security Breach
Sensitive Personal Data
Service Provider
Services
System Administrator
System Resources
Technical Infrastructure
Third Party Services
Unauthorized Access
User Account
User Authentication
User Credentials
Virus
Malware
Website
Workstation
Access Rights
Account Security
Audit Rights
Compliance Requirements
Confidentiality
Data Protection
Data Privacy
Dispute Resolution
Email Usage
Emergency Rights
Enforcement
Force Majeure
Governing Law
Indemnification
Intellectual Property
Internet Usage
Liability Limitations
Monitoring Rights
Network Security
Password Security
Prohibited Activities
Reporting Obligations
Resource Usage
Security Requirements
Service Availability
Software Usage
System Access
System Maintenance
Term and Termination
Third Party Access
User Obligations
Violation Consequences
Warranties and Disclaimers
Information Technology
Banking and Financial Services
Healthcare
Education
E-commerce
Telecommunications
Manufacturing
Professional Services
Government and Public Sector
Media and Entertainment
Research and Development
Insurance
Retail
Information Technology
Legal
Compliance
Information Security
Risk Management
Operations
Human Resources
Digital Infrastructure
Corporate Security
System Administration
Network Operations
Data Protection
Chief Information Security Officer
IT Director
Network Administrator
System Administrator
Compliance Officer
Legal Counsel
Risk Manager
Information Security Manager
IT Operations Manager
Data Protection Officer
Chief Technology Officer
Digital Security Specialist
IT Policy Manager
Corporate Security Manager
Cyber Security Analyst
Find the exact document you need
Email And Internet Usage Policy
An internal policy document governing email and internet usage in accordance with Indian IT laws and regulations, establishing guidelines for appropriate use of electronic communications resources.
Aup Agreement
An Indian law-governed agreement defining acceptable use terms for IT resources and digital services, including usage rules, security requirements, and compliance measures.
Acceptable Use Policy Agreement
An Indian law-governed agreement establishing guidelines for acceptable use of computer systems and networks, ensuring compliance with Indian IT and cyber security regulations.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.