1. Purpose
This Acceptable Use Policy (AUP) outlines the responsible use of Speak AI Inc.’s information systems, networks, and assets to protect company resources, ensure compliance, and prevent misuse.
2. Scope
This policy applies to all employees, contractors, third-party vendors, and any individuals granted access to Speak AI Inc.'s systems, devices, applications, and data.
3. Acceptable Use Guidelines
3.1 General Responsibilities
Users must act responsibly and ethically when accessing company systems.
Company resources must be used for business purposes only unless otherwise authorized.
Any activity that jeopardizes the security, integrity, or availability of Speak AI’s systems is strictly prohibited.
3.2 Data Protection & Confidentiality
Users must comply with the Data Classification Policy regarding handling sensitive information.
Personally identifiable information (PII) and customer data must be protected and not shared outside authorized personnel.
Data encryption must be used where applicable.
3.3 Network & System Security
Users must not bypass security controls, such as firewalls, VPNs, or access restrictions.
Unauthorized scanning, monitoring, or tampering with networks, servers, or data is strictly prohibited.
Personal devices used for company purposes must comply with security requirements outlined in the Remote Network Access Policy.
3.4 Email & Communication Guidelines
Emails must be used for professional communication; phishing or social engineering attempts should be reported immediately.
Unsolicited bulk emails (spam), harassment, or offensive content transmission is prohibited.
Users must not impersonate others or misrepresent Speak AI in any way.
3.5 Internet & Software Usage
Users must not access, download, or distribute illegal, offensive, or unauthorized content.
Only approved and licensed software may be installed on Speak AI systems.
The use of personal cloud storage or unauthorized file-sharing services is prohibited.
3.6 Physical & Endpoint Security
Devices must be locked when unattended to prevent unauthorized access.
Lost or stolen devices must be reported immediately to [email protected].
Company-issued devices must only be used by authorized users.
4. Prohibited Activities
Attempting unauthorized access to systems or data.
Engaging in fraudulent or illegal activities.
Disabling or circumventing security controls.
Using company resources for personal gain without authorization.
5. Monitoring & Enforcement
Speak AI reserves the right to monitor system usage to ensure compliance.
Violations may result in disciplinary action, including termination of access or employment.
Users must report suspected violations to [email protected].
6. References & Supporting Documents
Speak AI Data Classification Policy: https://help.speakai.co/en/articles/9415977-data-classification-policy
Speak AI Remote Network Access Policy: https://help.speakai.co/en/articles/10504233-remote-network-access-policy
Speak AI Encryption Policy: https://help.speakai.co/en/articles/9367850-encryption-policy
7. Contact Information For any questions regarding this policy, contact [email protected].
This policy will be reviewed periodically to align with best practices and compliance requirements.