Acceptable Usage Policy
Purpose
This policy establishes guidelines and requirements for the use of artificial intelligence (AI) tools and services within the organization to protect company data, ensure compliance, and maintain security standards.
Scope
This policy applies to all employees, contractors, and temporary workers who use or wish to use AI tools in connection with their work duties.
Policy Statement
- All AI tools and services not created by Rygen must receive explicit approval before use in any work-related context.
- Only those tools found in the Approved AI Tools list may be used at Rygen, and those tools must be used according to their safe usage constraints.
- AI tools that cannot provide opt-out options for using data for training purposes are prohibited.
- Employees must verify and enable data privacy settings before using any approved AI tool.
- Sensitive company information, such as contact information and payment data, is prohibited from use with any AI tools.
- Company confidential information and proprietary data may only be input into AI tools that have been specifically approved for handling such data and must be used in accordance with any additional security requirements or restrictions specified during the approval process.
- Employees must not connect unauthorized third party AI systems directly to company databases, file systems, or any other information system owned by Rygen.
- Employees must report any potential data breaches or security concerns related to AI tool usage immediately.
Requirements for AI Tool Approval
- The tool must provide clear documentation of its data handling practices.
- The tool must offer the ability to opt out of data collection for training purposes.
- The tool must have enterprise-grade security features.
- The tool must comply with relevant industry regulations and standards.
- The vendor must provide clear terms of service and data processing agreements.
Prohibited Uses
- Using unapproved AI tools for any work-related purpose.
- Bypassing security settings or data privacy controls.
- Sharing access credentials for AI tools.
- Using unauthorized personal AI accounts for work purposes.
- Uploading sensitive company data to AI tools without explicit authorization.
- Connecting unapproved AI tools directly to company file systems or databases.
Compliance and Enforcement
- IT Security will maintain a list of approved AI tools.
- Regular audits will be conducted to ensure compliance.
- Violations may result in disciplinary action.
- All incidents involving unauthorized AI usage must be reported.
Approval Procedure
- Employee submits AI Tool Request Form to IT Security.
- IT Security reviews request and evaluates tool against security requirements.
- Legal reviews terms of service and data processing agreements.
- If approved, IT Security documents configuration requirements.
- Employee receives training on proper tool usage.
- IT Security enables and configures tool access.
See the AI Tool Approval Procedure for detailed approval steps.
Document Security Classification
Company Internal (please refer to the Data Classification policy for details).
Non-Compliance
Compliance with this policy shall be verified through various methods, including but not limited to automated reporting, audits, and feedback to the policy owner. Any staff member found to be in violation of this policy may be subject to disciplinary action, up to and including termination of employment or contractual agreement. The disciplinary action shall depend on the extent, intent, and repercussions of the specific violation.
Responsibilities
The IT Security Officer is responsible for approving and reviewing policy and related procedures. Supporting functions, departments, and staff members shall be responsible for implementing the relevant sections of the policy in their area of operation.
Review Schedule
This document shall be reviewed annually and whenever significant changes occur in the organization.
Revision History
| Version | Date | Author | Summary of Change |
|---|---|---|---|
| 1.0 | 2025-06-05 | Field Bradley | Initial draft. |
| 2.0 | 2025-08-22 | Field Bradley | Added restriction on connecting to company information systems |
| 2.1 | 2025-09-02 | Field Bradley | Migrated to markdown and gitlab |
| 2.2 | 2026-03-02 | Field Bradley | Added policy statement prohibiting connection of unauthorized AI systems to company information systems |