How to Develop a Solid Internet Use Policy for Your Business and How Secure File Sharing Tools Can Help

by Michael Fiorenza on March 17, 2016

The line between work life and personal life are ever blurring. Employees are taking more work home with them via personal computers and mobile devices. As work bleeds into the home life, more personal communications are seeping into work. Parents have to keep in touch with kids at home and in school. Workers have to coordinate with their spouses and partners. Most employees can't take time off to meet the repair person or to speak with their insurance adjuster about the flooded basement or smashed car fender. For all these reasons and more, it's critical for businesses to establish a good Internet use policy.


Find out how employees are currently using your systems. From there, you can build a policy that reflects what they like, what they need, and what is okay from the business' perspective.

The Internet use policy specifies what is and isn't allowed in terms of employee use of browsing, email, chat, and other work tools and perks while in the office and on the clock. The goal of a good Internet use policy is to allow workers to be productive while handling both their professional and personal issues seamlessly throughout the workday. For example, if Sally can shoot off a quick email to her babysitter using her work computer, it takes far less time away from her work than if she has to clock out and use her personal device to text or call. Similarly, a good Internet use policy will help Sally understand when it is and isn't okay to use her personal cell phone to communicate with clients or to access sensitive files she uses to do her job.

How can you establish a solid Internet use policy? Take these steps to success.

Start By Getting Employee Input

In order to begin a discussion about what you will allow or won't, you need a thorough understanding of how employees are currently using your systems and communications tools. So that your information is accurate, allow employees to give you feedback without repercussions. Make any information they give you anonymous, so that neither the executives nor the managers can see who's playing on Facebook during customer phone calls and who's using company emails to order from Victoria's Secret. Use this information to see where to start building a policy, not for immediate disciplinary action.

Be Sure the Policy Reflects the Corporate Values


Allowing a reasonable level of personal use on business systems actually keeps productivity high, because users don't have to take time away from their work to shoot off a quick email to family or handle a simple issue like scheduling a dentist appointment.

In addition to reflecting your worker's use habits, the Internet use policy also needs to represent your core values and company mission. Certain issues will automatically be prohibited, such as any illegal or obviously unethical practices. But you will also need to establish when it's okay for IT to access personal Internet use. What if workers are having an affair? What if their use patterns indicate something like a gambling addiction? Make it clear to both IT and the workers what is considered the employee's private business and when their behavior crosses the line into the company's business.

Centralize Corporate Data and Utilize Secure File Sharing Tools

No policy is any better than the technologies that allow you to enforce it. The easiest, surest, most affordable and secure solution is to centralize all of the corporate communications and Internet use records and then empower access via a secure file sharing tool. This method assures that data will be retrievable in the event that it is needed for litigation or other purposes, but that it isn't readily accessible by unauthorized persons.

You can see how this secure file sharing solution works by viewing this demo video. With a smart Internet use policy in place, both you and your employees can relax, knowing what's okay, what is not, and what the consequences are for failing to abide by company policy.

November 28, 2017

Trends in Software-Defined Infrastructure

A fully software-defined data center (SDDC) -- an idea that seemed impossible just a few years ago -- is now becoming a reality for many organizations. Here's a...
Continue »


November 16, 2017

Trends in Remote Computing

What happens when big data, mobile computing, and IoT converge? You get edge computing -- and special data consolidation and analysis strategies to accompany it...
Continue »


November 3, 2017

Trends in Disaster Recovery

Disaster recovery plans have been a part of organizations' data management and availability strategies for years. However, disaster recovery techniques have evo...
Continue »


November 2, 2017

Trends in Data Storage

We're in the midst of a data storage revolution. Whereas data storage technologies remained relatively unchanged for decades, the last several years have witnes...
Continue »