tech etiquette helps employees use company technology resources, equipment, and devices in the most appropriate way

Tech Etiquette At Work: 9 Rules For Employees

Earn a free micro-certificate with a quick quiz!

Who this micro-class is for

* Employees and managers

What you’ll learn

* How to appropriately use company tech resources and equipment


* Less than 7 minutes to complete

About this micro-class

It’s crucial for employees to be familiar with and adhere to their company’s specific policies and guidelines to maintain a secure and productive working environment. If in doubt, employees should seek guidance from their IT department or human resources.

Tech Etiquette Rules and Best Practices for Employees

1. Acceptable Use Policy (AUP)

Familiarize yourself with the company’s acceptable use policy. 

This document typically outlines what is considered appropriate and inappropriate use of company technology resources, including internet usage, email communication, and software applications.

2. Security Awareness

Be aware of and follow security protocols. This includes using strong passwords, not sharing login credentials, and being cautious about phishing attempts.

3. Data Protection

Respect data privacy and protection regulations. 

Avoid unauthorized access to sensitive information, and follow proper procedures for handling and storing confidential data.

4. Equipment Care

devices and company tech equipment and resources

Take good care of company equipment. This includes laptops, smartphones, and other devices.

Report any issues promptly and avoid personalizing or modifying company-owned devices without permission.

Keep devices clean, away from hazards such as sources of heat, and secure. 

Lock devices when you are not using them. Never leave company equipment unguarded in public places.

5. Software Licensing


Ensure that you use only licensed software and adhere to the terms of use.

Unauthorized installation of software can lead to legal consequences.

6. Network Usage

Do not engage in activities that could compromise the company’s network, such as attempting to access restricted sites or downloading unauthorized content.

7. Communication Etiquette

how to deal with difficult guests

Use company communication tools responsibly.

Avoid inappropriate language, tone, or behavior in emails, chats, and other communication channels.

8. Time Management

Use company time and resources for work-related activities.

Avoid excessive personal use of company computers and the internet during working hours.

9. Remote Work Policies

If applicable, follow remote work policies and guidelines.

This may include secure VPN usage, data protection measures, and expectations for communication and availability.

Common Tech Etiquette Mistakes for Employees

Unauthorized Software Installation

Installing unauthorized software on company devices without proper approval can introduce security risks and violate licensing agreements.

Negligent Handling of Sensitive Information

Mishandling or sharing sensitive information without proper authorization can lead to data breaches and legal consequences.

Ignoring Security Alerts

Ignoring or dismissing security alerts can leave the company vulnerable to cyber threats. Promptly report any suspicious activity or security concerns.

Using Company Resources for Personal Gain

Using company resources for personal projects or financial gain is a breach of trust and can lead to disciplinary action.

Poor Password Practices

Weak passwords, password sharing, and using the same password across multiple accounts can compromise security.

Follow strong password practices and use unique passwords for different accounts.

Inappropriate Use of Communication Tools

Using company communication tools for non-work-related activities, especially if inappropriate or offensive, can lead to conflicts and disciplinary actions.

Failure to Update Software

Neglecting to update software and systems can expose vulnerabilities.

Regularly install updates and patches to ensure security.

Bypassing Security Measures

Attempting to bypass security measures, such as firewalls or access controls, can lead to serious consequences and compromise the overall security of the company.

Unauthorized Access

Accessing areas of the network or specific files without proper authorization is a serious violation of company policies and can result in severe consequences.

Lack of Awareness

Failing to stay informed about company policies, industry regulations, and best practices can lead to unintentional policy violations.

Test Your Knowledge and Earn a Free Micro-certificate

Earn a free micro-certificate with a quick quiz!

Resources and useful links