Company: Blue Gold
Policy Owner: Management / IT
Version: 1.0
Effective Date: 19/01/2026
Review Frequency: Annually or following significant IT or regulatory changes
This policy defines the acceptable, secure, and responsible use of information technology and information assets at Blue Gold. It exists to:
Protect Blue Gold’s systems, data, people, and reputation
Reduce cyber, legal, financial, and operational risk
Set clear expectations for employees and contractors
Support compliance across all countries in which Blue Gold operates
This policy applies to:
All employees, contractors, consultants, temporary staff, and third parties (“Users”)
All Blue Gold–owned or Blue Gold–approved IT systems, accounts, and data
All locations, including offices, home working, client sites, and travel
All countries of operation, including the UK, US, EU, UAE (Dubai), and Ghana
Users must:
Use IT systems responsibly and primarily for business purposes
Protect Blue Gold data, systems, and credentials at all times
Follow security controls and instructions issued by Blue Gold
Act lawfully, ethically, and professionally
Promptly report mistakes, incidents, or suspicious activity
Limited personal use is permitted only if it is reasonable, minimal, lawful, and does not create risk or interfere with work duties.
Only Blue Gold–supplied computers and devices may be used to access company systems or data.
Personal laptops, tablets, or desktop computers must not be used for Blue Gold work.
Company devices must not be shared with family members, friends, or unauthorised persons.
Users must:
Keep devices physically secure at all times
Lock screens when unattended
Allow required security software, updates, and monitoring
Never disable antivirus, encryption, firewall, or endpoint protection tools
Users must:
Use only their own assigned accounts
Never share passwords, MFA codes, or login credentials
Use strong, unique passwords as required
Enable multi-factor authentication where provided
Log out or lock devices when not in use
Access to systems and data is granted on a least-privilege, need-to-know basis and may be removed at any time.
Users must:
Access only the data required for their role
Store data only in approved Blue Gold systems
Use approved methods for file sharing and collaboration
Protect confidential and personal data from unauthorised disclosure
Public: Approved for external sharing
Internal: For Blue Gold internal use only
Confidential / Restricted: Strictly limited access (e.g. financial data, personal data, contracts, credentials)
Confidential or personal data must never be copied to:
Personal email accounts
Personal cloud storage (e.g. Google Drive, iCloud, Dropbox)
Unapproved software or platforms
Users must:
Treat all communications as professional business records
Be cautious with links and attachments
Report suspicious emails (phishing) immediately
Use company-approved communication tools only
The following are prohibited:
Harassment, discrimination, hate speech, or offensive content
Misrepresentation or impersonation
Excessive non-work use
Accessing or distributing illegal or inappropriate material
Only approved and licensed software may be installed or used
Users must not sign up for new tools or SaaS platforms using a Blue Gold email address without approval
Browser extensions, scripts, or automation tools require approval
Blue Gold recognises the benefits of AI but requires responsible use.
Users must:
Use only AI tools approved by Blue Gold for work purposes
Never enter confidential, restricted, or personal data into public AI tools
Never input credentials, system configurations, or proprietary code
Treat AI output as unverified and review it for accuracy, bias, confidentiality, and legal risk
Users remain fully responsible for any work produced using AI tools.
When working remotely or travelling:
Use secure internet connections as instructed
Avoid public Wi-Fi hotspots, stick to hotel provided Wi-Fi only
Protect screens from shoulder-surfing
Never leave devices unattended in public places or vehicles
Report loss or theft immediately
To protect the business, Blue Gold may monitor and log:
Network activity
System usage
Security events
Use of company devices and accounts
Where permitted by local law, users should have no expectation of privacy when using Blue Gold systems.
Monitoring will be lawful, proportionate, and business-justified.
Users must comply with applicable laws and regulations in all operating regions, including data protection, cybersecurity, and computer misuse laws.
This includes respecting:
Personal data protection obligations
Confidentiality agreements
Contractual and regulatory requirements
Users must immediately report:
Phishing or suspicious messages
Malware or unusual device behaviour
Lost or stolen devices
Accidental data disclosure
Policy breaches (including their own mistakes)
Prompt reporting is essential and will be treated responsibly.
Report to: [email protected] telephone: +44 1225 588582
Exceptions to this policy must:
Be documented
Be risk-assessed
Be approved by management
Be time-limited
Failure to comply with this policy may result in:
Removal of system access
Disciplinary action up to and including termination
Legal or regulatory action where applicable
This policy will be reviewed:
At least annually
After significant security incidents
Following major regulatory or operational changes
IT Acceptable Use & Information Security Policy Agreement
I confirm that I have read, understood, and agree to comply with Blue Gold’s IT Acceptable Use & Information Security Policy.
I understand that failure to follow this policy may result in disciplinary action, up to and including termination, and/or legal consequences.
Netzen Solutions Ltd is a privately held IT Support company
formed in 2005 with a primary focus on providing the highest quality business IT support in the UK.
Netzen provide business IT Support & Services for small to medium sized companies.
Click here to get a free IT support quote straight to your inbox.
Netzen will review your details and provide an estimate on support costs within an hour.