Skip to content
arrow_back
search
ISM-1864 policy ASD Information Security Manual (ISM)

Develop and Enforce a System Usage Policy

Create and regularly update a policy that dictates how systems should be used within the organisation.

record_voice_over

Plain language

Creating and enforcing a system usage policy means setting clear rules about how people in your organisation can use computers and other devices. This matters because without clear guidelines, employees might use systems in ways that lead to security breaches, data loss, or even legal trouble for the organisation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A system usage policy is developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1864
priority_high

Why it matters

Without a system usage policy, users may misuse systems (e.g., unauthorised software or data handling), increasing breach risk and legal exposure.

settings

Operational notes

Assign policy ownership; publish to all users; require onboarding and annual acknowledgement; review at least annually and after major system or threat changes.

Mapping detail

Mapping

Direction

Controls