Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Technology powers almost everything in modern business - from email and cloud storage to point‑of‑sale systems and remote work tools. With that convenience comes risk: data breaches, cyberattacks, staff misuse of systems, and compliance gaps can derail operations and damage your brand.
A clear set of IT policies and procedures helps you set the rules, protect sensitive information, and stay on the right side of Australian law. If you’re unsure where to start - or you’ve outgrown ad‑hoc practices - this guide walks you through what to include, how to tailor your approach, and the legal requirements to keep in view.
Our goal is to make this simple and practical so you can use technology with confidence as you grow.
What Are IT Policies And Procedures?
An IT policy is a written set of rules about how your business uses technology - for example, how staff access systems, handle data, use workplace internet and email, and secure devices. Procedures are the step‑by‑step instructions that put those rules into action.
A helpful way to think about it: the policy is the “what and why,” and the procedure is the “how.” Together, they support cyber security, privacy, risk management, and legal compliance.
Common policies and procedures include:
- Acceptable Use Policy to set boundaries for using company devices, networks, email, collaboration tools, and social media at work.
- Password and Access Control Policy covering strong passwords, multi‑factor authentication, and role‑based access.
- Remote Work and BYOD (Bring Your Own Device) rules for working off‑site and using personal devices securely.
- Data Classification and Handling rules for storing, sharing, and disposing of customer, employee, and confidential business information.
- Information Security Policy to set your approach to cyber risk, backups, encryption, and vendor access.
- Incident Response Procedure and a Data Breach Response Plan that outline what to do if a cyber incident or data loss occurs.
- Offboarding checklist to remove access, retrieve devices, and transfer ownership of accounts when people leave.
Writing these down (not just relying on “common sense”) helps your team act consistently and gives you a solid basis for training, accountability, and decision‑making if something goes wrong.
Why Do IT Policies And Procedures Matter In Australia?
Even small, close‑knit teams benefit from formal policies. Here’s why they’re worth prioritising.
- Reduce security risk: Clear rules on passwords, remote access, and data sharing prevent many common breaches and mistakes.
- Support legal compliance: If you handle personal information, send direct marketing, or monitor workplace systems, you’ll need processes aligned with Australian law.
- Protect your brand: A single privacy complaint or cybersecurity incident can erode hard‑won trust. Policies help you prevent issues and respond quickly.
- Enable growth: As you hire or bring in contractors, agreed‑upon tech rules keep everyone on the same page.
- Manage staff issues fairly: Documented expectations make it easier to address misuse, investigate incidents, and apply consistent consequences.
Good policies show customers, partners, and insurers that you take data security seriously - and they make day‑to‑day decisions easier for your team.
How Do I Create IT Policies For My Business?
Great policies aren’t copied from a generic template. They’re tailored to your tech stack, team, and risk profile. Here’s a simple roadmap.
1) Map Your Technology And Data
Start with a quick audit:
- Systems in use (email, cloud storage, HR/payroll, CRM, finance tools, messaging apps, specialist industry software).
- Types of data (customer records, payment details, employee files, intellectual property, supplier contracts).
- Who has access (employees, contractors, managed service providers, integrators, offshore support).
- Known risks and near‑misses (phishing attempts, lost devices, misdirected emails, weak passwords).
This helps you focus policies where they matter most.
2) Identify Your Legal And Contractual Obligations
Australian requirements vary depending on your size, industry, and the data you handle. In particular, consider:
- Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs): Many small businesses with annual turnover under $3 million are exempt. However, there are important exceptions - for example, health service providers, businesses that trade in personal information, contractors to the Commonwealth, or those handling Tax File Number information. If the APPs apply (or you opt‑in as a best‑practice choice), your policies should reflect those obligations, and having a publicly available Privacy Policy is expected.
- Notifiable Data Breaches (NDB) scheme: For eligible data breaches that are likely to cause serious harm, you must promptly notify affected individuals and the Office of the Australian Information Commissioner (OAIC). Your incident procedure and Data Breach Response Plan should explain how you will assess and notify for eligible breaches.
- Spam Act 2003 (Cth): If you send marketing emails or SMS, ensure consent, identification, and a functional unsubscribe. Your acceptable use and marketing procedures should reflect these rules.
- Workplace monitoring and surveillance laws: These are state and territory‑based. For example, NSW requires explicit notice before computer, email, or internet monitoring in the workplace. Your policy should explain what monitoring occurs and how staff are informed. When in doubt, align with the strictest notice approach and document it clearly. It can also help to understand the rules around recording laws in NSW if your tools capture audio or video.
- Contractual requirements: Clients, insurers, and vendors often impose security standards (e.g., MFA, encryption, SOC2‑aligned practices). Build these into your policies so they’re embedded in day‑to‑day work.
3) Draft Policies In Plain English
Policies should be short, practical, and easy to follow. Aim for clear do/do‑not rules, not vague aspirations.
- Be specific: “Enable MFA on all business accounts” beats “use secure logins.”
- Include reporting steps: “Report suspicious emails to IT immediately - do not click links.”
- Set minimums: password length, device lock timeouts, approved storage locations.
- Cover exits: access removal, device return, and data handover during offboarding.
Where online systems are involved, align staff rules with what’s on your website and app - for instance, make sure your Privacy Policy, website terms, and internal data handling procedures tell a consistent story.
4) Train Your Team And Make Policies Easy To Find
Policies only work if people understand them. Run short induction training, refresh annually, and keep documents accessible (in your staff handbook or intranet). Consider a quick quiz or acknowledgment to confirm understanding.
5) Review Regularly
Technology and threats change quickly. Review policies at least annually, or when you adopt new systems, expand into new markets, or change your service model. If you handle large volumes of personal information, it’s also wise to revisit your approach to data retention and deletion on a regular cycle.
What Legal Requirements Apply To IT Policies?
Your obligations depend on your operations, but the following areas are commonly relevant.
Privacy And Data Protection
Whether the APPs apply to you depends on turnover and the exceptions noted above. If they do apply (or you choose to follow the APPs as best practice), you’ll typically need:
- Privacy Policy: A clear, accessible explanation of what personal information you collect, why you collect it, how you use and disclose it, and how people can access or correct it. Publishing a Privacy Policy is expected under the APPs.
- Collection notices: Tell people at (or before) the point of collection what information you’re collecting and for what purpose - an internal process plus a collection notice makes this consistent.
- Data breach process: A documented method to assess suspected breaches and, for eligible data breaches, notify the OAIC and affected individuals under the NDB scheme. Having a Data Breach Response Plan is strongly recommended.
If the APPs don’t strictly apply (for example, you’re a small business without an exception), many organisations still choose to adopt similar privacy practices to build trust and meet client expectations.
Spam And Direct Marketing
If you send marketing messages, you must have consent, identify your business in each message, and include an easy unsubscribe option. Your IT and marketing procedures should standardise how you obtain consent and process opt‑outs to minimise risk.
Workplace Monitoring And Employee Privacy
Some states and territories regulate employee monitoring (e.g., email, internet, keystrokes, CCTV) more explicitly than others. In NSW, for instance, the Workplace Surveillance Act requires prior notice of computer surveillance. In other jurisdictions, general surveillance and privacy laws apply. Your acceptable use rules should explain what monitoring is in place and how notice is provided.
Third‑Party Vendors And Cloud Services
When you use managed service providers or SaaS platforms, ensure your contracts set out security standards, incident notification timelines, and roles. A tailored Data Processing Agreement helps control how suppliers store and access your data, which reduces legal and operational risk.
Essential Policies And Documents To Consider
Every business is different, but the following core documents are a strong starting point.
Core IT Policies
- Acceptable Use Policy: Sets rules for using devices, networks, email, messaging tools, social media, AI tools, and cloud storage in a work context.
- Information Security Policy: Explains your security approach - identity and access management, encryption, backups, patching, vendor access, and logging.
- Password And Access Control Policy: Details password standards, MFA, account lifecycle, and privileged access approvals.
- Remote Work/BYOD Policy: Covers device configuration, VPN use, local storage, and physical security when working off‑site.
- Incident Response Procedure and Data Breach Response Plan: Step‑by‑step playbooks for suspected security incidents and eligible data breaches under the NDB scheme.
Privacy And Communications
- Privacy Policy: Communicates how you handle personal information, aligned with the APPs if applicable or adopted as best practice.
- Collection Notices: Standard wording for forms, online checkouts, and onboarding to explain why you’re collecting data.
- Email Disclaimer: A simple way to manage risk when emails are misdirected or contain confidential information.
Contracts That Reinforce Your Policies
- Employment Contract: Builds your IT and confidentiality expectations into the employment relationship, including device return and IP ownership.
- Contractor Agreement: Mirrors your IT and data rules for non‑employees who access your systems or data.
- Data Processing Agreement: Sets minimum security, breach notification, and data handling standards for your IT vendors and processors.
You may not need every document from day one, but many businesses adopt these early to set a strong foundation. As you scale, you can layer on more detail and sector‑specific requirements.
Best Practice Tips For Rolling Out IT Policies
Policies shouldn’t sit in a drawer. Here’s how to make them work in practice.
- Keep it practical: Short, plain‑English rules get used. Long, technical manuals don’t.
- Assign ownership: Nominate someone to maintain policies, run training, and coordinate incident responses.
- Train little and often: New starter induction plus quick annual refreshers work well. Use real‑world examples from your business.
- Test your response: Run tabletop exercises for a mock data breach or ransomware incident so the first time isn’t during a crisis.
- Align with your operations: Make sure the rules reflect the tools you actually use - for example, if you rely on shared inboxes or third‑party integrations, spell out how they’re secured.
- Close the loop on offboarding: A thorough exit checklist prevents orphaned accounts and lingering access.
If your operations are evolving quickly, it can help to stage changes - start with a baseline set of rules, then add depth as your systems and risk profile mature.
Key Takeaways
- IT policies turn good intentions into clear, practical rules that reduce cyber risk and support legal compliance in Australia.
- Privacy obligations depend on whether the APPs apply to your business; many small businesses are exempt but may still choose best‑practice privacy measures and a public Privacy Policy.
- For eligible data breaches likely to cause serious harm, you must notify affected individuals and the OAIC under the NDB scheme - your Data Breach Response Plan should explain how.
- Workplace surveillance rules differ by state and territory; your acceptable use and monitoring notices should match the jurisdiction where staff work.
- Core documents to consider include an Acceptable Use Policy, Information Security Policy, incident procedures, privacy materials, Employment Contracts, and a Data Processing Agreement for vendors.
- Train your team, keep policies short and accessible, and review them as your technology and risks change.
If you would like a consultation on creating or updating IT policies and procedures for your business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








