Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Technology runs through every part of your business - from email and cloud storage to point‑of‑sale systems, apps and AI tools. With that convenience comes risk. Clear, practical IT policies help your team know what’s expected, reduce legal exposure, and build trust with customers and partners.
The good news is you don’t need to start from scratch. With the right IT policy template and a few local legal pointers, you can roll out something robust and easy to follow. In this guide, we’ll explain what to include, how to implement it, and the key Australian laws to keep in mind (without the myths or jargon).
Whether you’re a sole trader, a growing startup or an established company, you can put a fit‑for‑purpose policy in place - and we’re here to make that process simple.
Why An IT Policy Matters (Without The Legal Myths)
An IT policy sets the ground rules for how your people use business systems, devices and data. It complements your other policies and focuses on practical “how we work” guidance: access, security, software use, remote work, incident reporting and more.
Done well, it supports three big goals.
- Better security and fewer mistakes: Clear rules for passwords, multi‑factor authentication, approved apps and device use limit the chance of breaches or accidental data leaks.
- Smoother operations: Staff know what’s allowed, how to get access, and what to do if something goes wrong - which reduces downtime and confusion.
- Legal risk management: Documented policies and training are often part of taking “reasonable steps” to protect information. They can also help you meet client, supplier or insurer expectations.
Let’s correct a couple of common misconceptions in Australia:
- Not every business is legally required to have written IT policies. Under the Privacy Act 1988 (Cth), many small businesses with an annual turnover of $3 million or less are exempt from most Australian Privacy Principles (APPs). There are important exceptions (explained below), and clients may still contractually require policies - but it’s not automatically a legal must for everyone.
- The Notifiable Data Breaches (NDB) scheme applies to APP entities. If you’re an APP entity (or you handle certain categories like Tax File Number information), you must assess eligible data breaches and notify affected individuals and the OAIC in specific circumstances. Having an IT policy isn’t a stand‑alone “compliance ticket,” but it’s often part of showing you took reasonable steps to protect personal information.
In short: a clear IT policy is smart risk management, often expected by customers and partners, and for many organisations it’s part of meeting privacy and cybersecurity obligations. It also pairs naturally with an Information Security Policy that sets higher‑level objectives and responsibilities.
What Should An IT Policy Include?
Your template should be short, practical and tailored to the tools you actually use. Most Australian businesses cover the following:
Acceptable Use
- What staff can and can’t do with business systems, devices, networks and accounts.
- Rules for personal use, prohibited activities, and consequences of breaches.
Access And Account Management
- How access is requested, approved, reviewed and revoked (especially for starters, movers and leavers).
- Requirements for strong passwords and multi‑factor authentication.
Device And Data Security
- Minimum security settings for laptops, mobiles and tablets (encryption, screen locks, patching).
- Storage rules for sensitive files, USBs and removable media.
Software And Cloud Services
- Approved software list, who can install apps, and how to request new tools.
- Licensing and update requirements for compliance and security.
Remote Work And BYOD
- Using personal devices, home Wi‑Fi, and public networks securely.
- Clear guidance for accessing files offsite and securing workspaces.
Communications And Social Media
- Email, chat and collaboration tools - including phishing awareness and external sharing.
- Expectations for social media and reputational risks (what’s in and out of bounds).
Privacy And Confidentiality
- How personal and confidential information must be collected, stored, used and disclosed.
- Reference to your publicly available Privacy Policy for external data handling practices.
Monitoring And Surveillance
- What system monitoring occurs (e.g. logs, email scanning) and how it’s disclosed to staff.
- Note that some states and territories have specific notice rules for workplace surveillance (more on this below).
Incident Reporting And Response
- How to report suspicious activity or data loss quickly.
- Who coordinates the response and how it links with your Data Breach Response Plan.
Training, Enforcement And Review
- How often staff are trained and how policy acceptance is recorded.
- Consequences for non‑compliance and how often the policy is reviewed.
If you handle higher‑risk data (health, finance, minors), add industry‑specific controls and reference any standards your contracts require (for example, customer security questionnaires or government procurement rules).
How To Create And Roll Out Your IT Policy
1) Start With A Fit‑For‑Purpose Template
Choose a template designed for Australian businesses that covers the core areas above. Keep the tone plain English and action‑oriented so your team can actually use it.
2) Tailor It To Your Tech Stack
Make it real. Name key systems (e.g. your cloud storage, CRM, accounting tools), specify who approves access, and list any approved VPNs, password managers or endpoint protection.
3) Align With Your Other Documents
Ensure the IT policy lines up with your higher‑level Information Security Policy, your Privacy Policy, and any wider workplace policies or handbooks. Consistent language reduces confusion and avoids contradictions.
4) Get The Right Voices In The Room
Involve the people who run your systems day‑to‑day (IT, operations, HR, team leads). They’ll spot gaps and help you set realistic, enforceable rules.
5) Communicate And Train
Share the policy, explain why it matters, and run short training to show staff how to follow it. Record acknowledgements during onboarding and refresher training, and consider an Email Disclaimer if staff send external communications from shared mailboxes.
6) Review And Improve
Set a review cycle (at least annually, or when you change core systems). Keep a version history so you can demonstrate your ongoing “reasonable steps” to protect information.
Australian Legal Considerations To Keep In Mind
The right approach depends on your size, industry and the kind of data you handle. Here are the main Australian law touchpoints to consider.
Privacy Act And The Small Business Exemption
- Who the APPs generally cover: Businesses with annual turnover over $3 million (and some smaller businesses) are APP entities and must comply with the Australian Privacy Principles.
- Small business exemption: Many small businesses under $3 million turnover are exempt - but there are important exceptions, including where you are a health service provider, you trade in personal information, you’re a contractor for a Commonwealth agency, you handle Tax File Number information, or you’re a credit provider/credit reporting body.
- Why policies still help: Even if you’re exempt, clients and enterprise customers often require documented privacy and security policies in contracts and due diligence.
Notifiable Data Breaches (NDB) Scheme
- If you’re an APP entity (or you hold certain regulated information), you must assess suspected eligible data breaches and notify affected individuals and the OAIC when required.
- Having a clear IT policy, staff training and a documented Data Breach Response Plan can streamline your response and show you took reasonable steps, which may reduce legal and reputational harm.
Workplace Surveillance And Monitoring
- States and territories have different rules. For example, in NSW and the ACT, employers generally must give clear written notice before using camera, computer or tracking surveillance in the workplace, and specific conditions apply to “covert” surveillance.
- Make sure your policy is consistent with local laws and your staff are notified appropriately. For practical context, it’s worth reading about cameras in the workplace and your obligations around call recording laws if you record customer calls.
Data Retention And Deletion
- Identify what you must keep (and for how long) under tax or industry rules, and what should be deleted when no longer needed. A retention schedule, tied to your systems, will strengthen your policy.
- Our overview of data retention laws in Australia can help you map the basics before you tailor specifics.
Third‑Party Vendors And Cloud Services
- When you use SaaS or other providers, clarify security responsibilities and data handling in your contracts. A Data Processing Agreement is a common way to set out privacy and security obligations between you and service providers.
Marketing And Spam
- Ensure your email and SMS practices comply with the Spam Act and consent rules, and align your IT policy with day‑to‑day marketing processes. Our explainer on email marketing laws sets out the essentials.
Finally, remember WHS obligations extend to the way people work with technology. Clear rules that minimise cyber risk, support safe remote work and reduce psychosocial hazards are all part of creating a safe system of work.
Essential Documents And Templates That Work With Your IT Policy
Your IT policy is part of a small, practical set of documents that work together. Depending on your business, consider putting these in place alongside it:
- Information Security Policy: High‑level objectives, roles and responsibilities for protecting information assets. This sets the overarching framework your IT policy follows. See: Information Security Policy.
- Privacy Policy: Your public‑facing notice explaining how you collect, use, store and disclose personal information (often required contractually and by law for APP entities). See: Privacy Policy.
- Data Breach Response Plan: A step‑by‑step playbook for triage, investigation and notification if an incident occurs. See: Data Breach Response Plan.
- Data Processing Agreement: Allocates privacy and security responsibilities with vendors and processors, including breach notification, sub‑processors and international transfers. See: Data Processing Agreement.
- Workplace Policy Or Staff Handbook: A central place for policies like acceptable use, social media, BYOD and remote work, with acknowledgement tracking. Consider a consolidated Workplace Policy if you’re building from zero.
- Email And Communications: An Email Disclaimer helps set expectations for external communications and confidentiality notices.
If you’re adopting new tools (for example, generative AI or productivity apps), consider a brief add‑on policy to set boundaries and protect confidential information while your team experiments.
Key Takeaways
- A clear, plain‑English IT policy helps your team work securely, reduces avoidable mistakes, and supports your legal and contractual obligations.
- Not every small business is automatically covered by the APPs, but many are - or they face client requirements - so it’s wise to document security and privacy practices anyway.
- Include the essentials: acceptable use, access control, device security, software and cloud, remote work, privacy, monitoring and incident response.
- Align your IT policy with your other documents, including your Information Security Policy, Privacy Policy, Data Breach Response Plan and vendor agreements.
- Be mindful of Australian‑specific rules, such as the NDB scheme for APP entities and state‑based workplace surveillance notice requirements.
- Train staff, record acknowledgements, and review your policy regularly so it stays practical and up to date.
If you’d like a consultation on creating the right IT policy template for your Australian business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no‑obligations chat.








