Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
- What Is An IT Policy And Why Small Businesses Need One
IT Policy Examples: Core Policies To Include
- Acceptable Use (Devices, Systems And Internet)
- Bring Your Own Device (BYOD) And Mobile Use
- Password, Access And Account Management
- Data Protection And Privacy
- Information Security And Cyber Essentials
- Incident Response And Reporting
- Remote And Hybrid Working
- Cloud, SaaS And Shadow IT
- Email, Messaging And Communications
- Monitoring, CCTV And Privacy Expectations
- AI Tools And Generative Content
- Software Licensing And Intellectual Property
- Change Management And System Administration
- Essential Legal Documents To Support Your IT Policies
- Common Mistakes To Avoid
- Key Takeaways
If your team uses laptops, mobiles, cloud apps or AI tools (and whose doesn’t?), solid IT policies aren’t a “nice to have” - they’re essential. Clear, practical rules keep your data safe, help you comply with UK law, and set expectations for staff so everyone knows what “good” looks like.
In this guide, we’ll walk through IT policy examples tailored for small businesses, the UK laws you need to think about, and a step-by-step rollout plan that actually sticks. We’ll also point you to the key legal documents that support your IT policies so you’re protected from day one.
What Is An IT Policy And Why Small Businesses Need One
An IT policy is the set of rules your business creates to manage how people use tech, data and systems. It covers your devices, networks, cloud platforms, communications, accounts, security, AI tools and more - and it applies to employees, contractors and sometimes suppliers who access your systems.
For small businesses, the benefits are immediate:
- Clarity and consistency - staff know what they can and can’t do, reducing mistakes.
- Legal compliance - your policies help you meet duties under UK GDPR, the Data Protection Act 2018 and the Privacy and Electronic Communications Regulations (PECR).
- Security and resilience - strong rules on access, passwords, and incident response reduce downtime and losses if something goes wrong.
- Fewer disputes - spelling out processes and consequences makes management decisions fair and defensible.
Think of IT policies as your operating manual for safe, lawful and efficient technology use. Decisions you make now (like how staff use personal mobiles for work) can have a big impact as you scale - so it’s worth getting this right.
IT Policy Examples: Core Policies To Include
Every business is different - but most SMEs benefit from the following IT policy areas. Use these examples as a starting point, then tailor the scope and detail to your risk profile and tools.
Acceptable Use (Devices, Systems And Internet)
Set out permitted and prohibited uses of company devices, networks, apps and the internet. Cover:
- Business vs limited personal use (during breaks, bandwidth-heavy streaming, etc.).
- Prohibited activities (malware, pirated content, offensive material, unauthorised downloads).
- Security basics (no sharing accounts, locking screens, reporting suspicious emails).
- Ownership of devices and data and the right to retrieve data when employment ends.
It’s often helpful to house this as a dedicated Acceptable Use Policy and reference it in your onboarding pack.
Bring Your Own Device (BYOD) And Mobile Use
If staff use personal mobiles or laptops for work, you’ll want clear rules on:
- Mobile device management (MDM), security controls, and minimum OS versions.
- Which apps may be used for work (e.g. no personal email for client data).
- What happens on exit (remote wipe of corporate data, return of accessories, access revocation).
- Privacy boundaries (what the business can and cannot see on personal devices).
There are specific data protection pitfalls with personal devices - our article on BYOD dives into common GDPR risks to watch for.
Password, Access And Account Management
Strong authentication is one of the simplest ways to reduce risk. Your policy should require:
- Multi-factor authentication (MFA) on all critical systems.
- Unique passwords stored in a password manager, never shared.
- Least-privilege access - users get the minimum they need to do their job.
- Joiner-mover-leaver processes: prompt account creation, permission changes and revocation.
Data Protection And Privacy
Under UK GDPR and the Data Protection Act 2018, you must protect personal data. Your policy should cover:
- Data classification (e.g. personal, sensitive/special category, confidential, public).
- Data minimisation and lawful basis for processing.
- Storage, encryption, retention periods and secure disposal.
- Data subject rights (access, deletion, rectification) and internal request handling.
Externally, your customer-facing Privacy Policy should mirror these practices in plain English.
Information Security And Cyber Essentials
Set baseline controls that fit your business, such as:
- Device hardening (firewalls, antivirus, patching timelines).
- Network rules (guest Wi-Fi separation, VPN use, remote access controls).
- Vendor management (due diligence for cloud providers, security questionnaires).
- Backups and restore testing, including offsite or immutable backups.
You can map your controls to Cyber Essentials as a practical framework for SMEs.
Incident Response And Reporting
Breaches happen. Your policy should set out who does what, when - including:
- How staff report suspected incidents and to whom (with contact details).
- Initial containment steps (disconnect device, reset credentials, preserve logs).
- Escalation criteria, timelines and record-keeping.
- Regulatory reporting triggers (e.g. reportable personal data breaches to the ICO within 72 hours).
It’s wise to maintain a practical Data Breach Response Plan alongside the policy so you can act quickly under pressure.
Remote And Hybrid Working
If your team works from home or on the road, clarify:
- Secure home workspace expectations (private area, locked screens, shredder use).
- Approved networks (no public Wi-Fi without a VPN) and handling of printed materials.
- Transporting devices and data securely (no leaving laptops in vehicles).
Cloud, SaaS And Shadow IT
Most SMEs rely on cloud apps. Your policy should address:
- Who can procure new apps, and approval criteria (security, data location, vendor terms).
- Integration and single sign-on standards.
- Prohibition of “shadow IT” - using unapproved tools for company data.
When engaging third-party processors, put a compliant Data Processing Agreement in place to set security and compliance obligations.
Email, Messaging And Communications
Spell out appropriate use of email, chat and video tools, including:
- Phishing awareness and how to report suspicious messages.
- Business records - when to use email vs chat, and retention rules.
- Marketing communications and opt-in rules to align with PECR.
Monitoring, CCTV And Privacy Expectations
Be transparent about any monitoring (e.g. email logging, web filtering, device management). Explain what’s monitored and why, and link it to legitimate business interests. If you use CCTV with audio in the workplace or monitoring tools, ensure your practice aligns with UK GDPR and ICO guidance, and reflect this in your policy and privacy notices.
AI Tools And Generative Content
AI is powerful - but risky if used carelessly. Consider a short, separate Generative AI Use Policy to cover:
- No input of confidential or personal data into public AI tools.
- Human review of outputs for accuracy, bias, IP and compliance.
- Attribution and copyright checks for generated images, code or text.
- Vendor terms for any enterprise AI tools.
Software Licensing And Intellectual Property
Set rules for acquiring software, respecting licences and handling open-source components. Clarify that work product created by employees using company systems belongs to the business, and describe approval processes for releasing code or content publicly.
Change Management And System Administration
Finally, document how you make changes to systems - who can deploy, what’s tested, and how changes are rolled back if something breaks. Even lightweight change control reduces outages and security gaps.
Which UK Laws Should Your IT Policies Cover?
Your IT policies should reflect and help you comply with core UK laws. Here are the big ones for SMEs, explained in plain English:
UK GDPR And Data Protection Act 2018
These laws require you to process personal data lawfully, fairly and transparently, and to take appropriate technical and organisational measures to keep it secure. In practice, that means:
- Having a lawful basis to collect and use personal data (e.g. contract or consent).
- Being transparent via your Privacy Policy and internal records of processing.
- Only collecting what you need, keeping it accurate, and deleting it when it’s no longer needed.
- Protecting data with security controls (MFA, encryption, access controls).
- Responding to subject access requests within one month.
- Reporting certain personal data breaches to the ICO within 72 hours.
PECR (Cookies And Electronic Marketing)
PECR sits alongside UK GDPR and regulates marketing emails and cookies. In short:
- Marketing emails/texts usually require consent unless you qualify for the “soft opt-in”.
- Non-essential cookies need consent - make sure your Cookie Policy and banner are accurate and transparent.
Computer Misuse Act 1990
Prohibits unauthorised access to computer material and unauthorised acts with intent to impair the operation of a computer. Your policies should forbid activities that could breach this (e.g. sharing credentials, hacking tools, deliberate malware).
Employment Law And Monitoring
If you monitor staff devices or communications, you must do so lawfully and proportionately, with clear notice and a legitimate reason. Your policies should explain what’s monitored, for what purpose, and any disciplinary consequences - and align with broader HR policies and your Staff Handbook.
Contracts With Vendors And Clients
When outsourcing processing to cloud vendors or IT support, UK GDPR requires a written agreement with specific clauses. Use a robust Data Processing Agreement to set security duties, audit rights and breach notification timelines.
How To Draft, Implement And Enforce Your IT Policies
Policies only help if people read them, understand them and follow them. Here’s a practical approach that works for SMEs.
1) Map Your Risks And Tools
List your systems, data types and key risks (e.g. customer data in CRM, payment details handled by a third party, remote workers). This helps you decide which policies you actually need and how detailed they should be.
2) Decide What’s Mandatory Versus Guidance
Keep the main policy clear and enforceable: short statements of what’s required or prohibited. Put how-to guides, screenshots and FAQs in separate user guides that you can update more often without re-issuing the policy.
3) Draft In Plain English
Use short sentences and make roles and responsibilities explicit. For example, “All staff must turn on MFA for their accounts” is stronger and clearer than “Staff should consider enabling MFA”. Avoid legal jargon where possible - your goal is compliance, not confusion.
4) Align With External-Facing Documents
Ensure your internal policies match your public-facing commitments. If your website promises limited retention, make sure your internal retention schedules and deletion processes deliver on that. The same goes for cookie banners and your Cookie Policy.
5) Get The Right Legal Building Blocks In Place
Your IT policies sit within a broader compliance framework. For example, a Data Breach Response Plan operationalises your incident section, and a Data Processing Agreement binds vendors to your standards. The policy shouldn’t try to do everything - link to the right supporting documents.
6) Train, Acknowledge And Embed
Introduce the policy through short, role-based training. Ask staff to acknowledge they’ve read and understood it. Include IT policy acceptance in onboarding and annual refreshers. Reinforce key behaviours in team meetings and manager check-ins.
7) Monitor And Improve
Use light-touch monitoring to spot issues early (e.g. MFA coverage reports). Track incidents, near-misses and phishing test results. Review the policy at least annually or after a major change, and involve IT, HR and legal in the update.
8) Be Practical About Tools
Your policies should reflect how your tools actually work. If you store files in the cloud, address data residency, access and sharing controls in that context. If you’re unsure about a platform’s privacy posture, our explainer on Google Drive and GDPR highlights the key points to check for any cloud storage provider.
Template Clauses: IT Policy Examples You Can Adapt
These examples illustrate the tone and clarity that works well for SMEs. Tailor them to your systems and risks, and remember they’re not a substitute for tailored advice.
Access And Authentication
- “All business systems must use multi‑factor authentication (MFA). Where MFA is unavailable, the IT Manager will approve compensating controls and a plan to enable MFA.”
- “Passwords must be unique, at least 14 characters, and stored in the company-approved password manager. Do not share passwords.”
Use Of Devices And Software
- “Only company-approved software may be installed on company devices. Requests for new software must be submitted via IT and approved before use.”
- “Unapproved cloud apps (‘shadow IT’) must not be used for company data. Use the listed approved tools.”
Data Handling And Retention
- “Store personal data only in approved systems. Exporting data to spreadsheets or local drives requires IT approval and a documented retention plan.”
- “Delete personal data when it is no longer needed for the purpose collected, in line with the company’s retention schedule.”
Remote Work Security
- “Use the company VPN on public Wi‑Fi. Do not access company systems on shared or public computers.”
- “Lock screens whenever you step away. Paper records must be stored securely and shredded when no longer required.”
AI Use
- “Do not input confidential, client or personal data into public AI tools. Use only approved AI tools for business tasks.”
- “All AI outputs must be reviewed by a human for accuracy, bias, intellectual property and compliance before use or publication.”
Incident Reporting
- “Immediately report suspected security incidents (e.g. lost devices, phishing clicks, unusual account activity) to security@company.co.uk and your manager.”
- “Do not attempt to investigate or remediate incidents without guidance from IT. Preserve logs and evidence.”
BYOD
- “Personal devices used for work must be protected by a passcode/biometrics, encryption and up‑to‑date security patches.”
- “The company may remotely wipe corporate data from personal devices on loss, theft or when access is no longer required.”
Essential Legal Documents To Support Your IT Policies
Great policies are backed by well-drafted legal documents. The following are commonly needed by UK SMEs:
- Acceptable Use Policy - sets the day-to-day rules for devices, systems and internet use.
- Privacy Policy - explains how you collect and use personal data and helps you meet UK GDPR transparency duties.
- Data Processing Agreement - governs data protection obligations with your cloud or IT service providers.
- Data Breach Response Plan - a practical playbook for identifying, containing and reporting incidents.
- Staff Handbook - aligns IT rules with HR policies, disciplinary processes and employee obligations.
- Cookie Policy - pairs with your cookie banner to comply with PECR and UK GDPR for tracking technologies.
- Generative AI Use Policy - sets safe boundaries for AI tools in your workflows.
Avoid generic templates or copy-paste policies - it’s important your documents reflect your actual systems and risk profile. Getting these tailored properly will save headaches down the track.
Common Mistakes To Avoid
Here are pitfalls we often see (and how to avoid them):
- Policies that are too long or technical - keep the core rules concise and move guidance to separate playbooks.
- “Set and forget” rollouts - policies need onboarding, training, acknowledgements and periodic refreshers.
- Misalignment with reality - if your tools or practices have changed (e.g. new CRM), update the policy quickly.
- No vendor controls - onboarded apps without a Data Processing Agreement or security checks invite risk.
- Unclear BYOD boundaries - be explicit about privacy, remote wipe and exit processes to avoid disputes.
- Not practising incidents - run tabletop exercises so your team knows exactly what to do under pressure.
Key Takeaways
- Start with core IT policy areas: acceptable use, BYOD, access and passwords, data protection, incident response, remote work, cloud/SaaS and AI.
- Tie your policy to UK GDPR, the Data Protection Act 2018 and PECR - and reflect those duties in your internal processes and your public-facing Privacy Policy and Cookie Policy.
- Support your policy with the right legal documents, including an Acceptable Use Policy, Data Processing Agreement and Data Breach Response Plan.
- Roll out your IT policies with training, acknowledgements and light-touch monitoring - and review at least annually or after major changes.
- Keep the language plain and actionable. The goal is adoption and compliance, not legalese.
If you’d like help drafting tailored IT policies and the supporting documents for your business, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


