Skip to main content
Acceptable Use Policy

Defines acceptable use of information and assets, ensuring proper handling and security practices.

Tyler Bryden avatar
Written by Tyler Bryden
Updated over 3 weeks ago

1. Purpose

This Acceptable Use Policy (AUP) outlines the responsible use of Speak AI Inc.’s information systems, networks, and assets to protect company resources, ensure compliance, and prevent misuse.

2. Scope

This policy applies to all employees, contractors, third-party vendors, and any individuals granted access to Speak AI Inc.'s systems, devices, applications, and data.

3. Acceptable Use Guidelines

3.1 General Responsibilities

  • Users must act responsibly and ethically when accessing company systems.

  • Company resources must be used for business purposes only unless otherwise authorized.

  • Any activity that jeopardizes the security, integrity, or availability of Speak AI’s systems is strictly prohibited.

3.2 Data Protection & Confidentiality

  • Users must comply with the Data Classification Policy regarding handling sensitive information.

  • Personally identifiable information (PII) and customer data must be protected and not shared outside authorized personnel.

  • Data encryption must be used where applicable.

3.3 Network & System Security

  • Users must not bypass security controls, such as firewalls, VPNs, or access restrictions.

  • Unauthorized scanning, monitoring, or tampering with networks, servers, or data is strictly prohibited.

  • Personal devices used for company purposes must comply with security requirements outlined in the Remote Network Access Policy.

3.4 Email & Communication Guidelines

  • Emails must be used for professional communication; phishing or social engineering attempts should be reported immediately.

  • Unsolicited bulk emails (spam), harassment, or offensive content transmission is prohibited.

  • Users must not impersonate others or misrepresent Speak AI in any way.

3.5 Internet & Software Usage

  • Users must not access, download, or distribute illegal, offensive, or unauthorized content.

  • Only approved and licensed software may be installed on Speak AI systems.

  • The use of personal cloud storage or unauthorized file-sharing services is prohibited.

3.6 Physical & Endpoint Security

  • Devices must be locked when unattended to prevent unauthorized access.

  • Lost or stolen devices must be reported immediately to [email protected].

  • Company-issued devices must only be used by authorized users.

4. Prohibited Activities

  • Attempting unauthorized access to systems or data.

  • Engaging in fraudulent or illegal activities.

  • Disabling or circumventing security controls.

  • Using company resources for personal gain without authorization.

5. Monitoring & Enforcement

  • Speak AI reserves the right to monitor system usage to ensure compliance.

  • Violations may result in disciplinary action, including termination of access or employment.

  • Users must report suspected violations to [email protected].

6. References & Supporting Documents

7. Contact Information For any questions regarding this policy, contact [email protected].


This policy will be reviewed periodically to align with best practices and compliance requirements.

Did this answer your question?