
February 11, 2026
Do we need an AI policy for ISO 27001?
Do you need an AI policy for ISO 27001? Not necessarily. Learn why ISO 27001 is about risk management, not documents, and how to assess AI within your ISMS properly.
Read MoreDo your users know what they can and can’t do while using your company data?
An Acceptable Use Policy (AUP) is more than a set of guidelines – it’s a critical line of defence in protecting your organisation from intentional or accidental misuse. It sets the standard for how IT resources should and shouldn’t be used, helping to safeguard against security risks, legal issues, and reputational damage.
Let’s face it: not everyone uses company resources responsibly. Without clear and concise guidance, people will operate how they believe they should. This can lead to mishandling of data, use of unlicensed software, and even a major data breach.
An AUP helps you:
Writing a strong AUP isn’t about creating a list of “don’ts.” It’s about clarity, consistency, and covering all the bases.
Here’s what you need to include:
ISO27001 auditors love a good policy, and the AUP is no exception. Annex A.5.10 specifically expects an AUP to be documented and implemented. Additionally, this also aligns with Annex A.6.3, which requires organisations to educate employees on information security responsibilities.
Put simply, a solid AUP ticks compliance boxes and supports the wider goal of building a security-aware culture – the cornerstone of any effective ISO27001 implementation.
An Acceptable Use Policy is more than a compliance requirement – it’s a practical tool for protecting your business, data, and people. Done right, it’s the backbone of your information security controls and a big tick in the ISO27001 compliance box.
We have created a base AUP for you, although we have detailed some of the key contents of an AUP, we thought we would get you started. Ensure you review the content and align it to how your business operates.
But here it is - Free AUP Example
Still looking for answers? You might find what you are looking for on our FAQ page
Alternatively, feel free to get in touch so we can discuss your organisations specific requirements.

February 11, 2026
Do you need an AI policy for ISO 27001? Not necessarily. Learn why ISO 27001 is about risk management, not documents, and how to assess AI within your ISMS properly.
Read More
August 14, 2025
Penetration testing simulates real-world cyberattacks to uncover vulnerabilities before malicious hackers can exploit them. This article explains the types of pen testing, the process, and why it’s essential for strengthening your organisation’s cyber defences.
Read More
August 6, 2025
ISO 27001 certification is a recognised security standard—but does it guarantee better protection? This article explores whether certification truly enhances security or if a risk-based approach without the badge can be just as effective.
Read More