Skip to content
arrow_back
search
ISM-1865 policy ASD Information Security Manual (ISM)

Compliance with System Usage Policies for Access

Employees must agree to follow system rules before they can access it.

record_voice_over

Plain language

This control requires that all employees agree to follow certain rules about how they use their work computer systems before they can log in and start using them. It matters because if people don't understand or follow these rules, they could accidentally or intentionally cause security breaches, leading to data loss or other serious problems for the organisation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Personnel agree to abide by system usage policies before being granted access to systems and their resources.
policy ASD Information Security Manual (ISM) ISM-1865
priority_high

Why it matters

If users are granted access without agreeing to system usage policies, misuse or policy breaches may go unchallenged, increasing insider risk and incident impact.

settings

Operational notes

Require policy acknowledgement before initial access and at periodic re‑acceptance (e.g., annually); record acceptance, block access if not accepted, and follow up on breaches.

Mapping detail

Mapping

Direction

Controls