Skip to content
arrow_back
search
Annex A 5.10 verified ISO/IEC 27001:2022

Acceptable Use Policies for Information and Assets

Create and communicate rules for how information and assets should be used to ensure security.

record_voice_over

Plain language

This control is about setting clear rules on how everyone in the organisation should use information and company resources, like computers and data. It's important because if people misuse these resources, it can lead to data breaches or loss, which can be costly and damaging to the organisation's reputation.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Organisational controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

19 Mar 2026

Maturity levels

N/A

Official control statement

Rules for the acceptable use and procedures for handling information and other associated assets shall be identified, documented and implemented.
verified ISO/IEC 27001:2022 Annex A 5.10
priority_high

Why it matters

Without acceptable use rules, staff may mishandle information or assets, causing data leakage, malware infection, and regulatory or reputational damage.

settings

Operational notes

Review and train on acceptable use for email, internet, cloud apps, BYOD and remote work; define prohibited actions, monitoring, and sanctions.

Mapping detail

Mapping

Direction

Controls