acceptable use

✅ Acceptable Use Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "acceptable use" with this command: npx skills add hack23/homepage/hack23-homepage-acceptable-use

✅ Acceptable Use Skill

🎯 Purpose

Enforce behavioral expectations and professional standards for information technology use, based on Acceptable Use Policy.

Key Principle: "Clear expectations create secure behaviors."

📚 Scope

  • 💻 System Access & Authentication

  • 📊 Data Handling & Privacy (GDPR)

  • 💾 Software & Application Use

  • 🌐 Internet & Network Use

  • 📱 Mobile Device & Remote Work

  • 📢 Communication & Social Media

⚙️ Security Rules

MUST Requirements

acceptable_practices: authentication: - strong_unique_passwords: per_access_control_policy - mfa_enabled: all_business_critical_systems - password_managers: approved_tools_only - no_credential_sharing: never_share_passwords

data_handling: - classify_data: per_classification_framework - encrypt_sensitive: cryptography_policy_standards - gdpr_compliance: privacy_policy_requirements - secure_disposal: shred_or_wipe_sensitive_data

software_use: - licensed_software: valid_commercial_or_oss_licenses - security_updates: vulnerability_management_sla - approved_apps: documented_in_asset_register

network_use: - https_required: secure_connections_for_sensitive_data - vpn_for_remote: network_security_policy_requirements - no_public_wifi: for_unencrypted_business_access

professional_conduct: - business_purpose_primary: limited_personal_use_acceptable - reputation_protection: conduct_reflects_company - confidentiality: no_unauthorized_disclosure

MUST NOT Prohibitions

prohibited_activities: illegal: - hacking_unauthorized_access - software_piracy - illegal_content - fraud_theft

malicious: - introducing_malware - circumventing_security - data_theft - sabotage

policy_violations: - unencrypted_sensitive_data - unapproved_software - credential_sharing - excessive_personal_use

reputation_damage: - disclosing_confidential_info - harassment_discrimination - inappropriate_content

💡 Examples

Example 1: Secure Work Practices (Compliant)

daily_routine: start_of_day: - use_strong_password: password_manager_autofill - enable_mfa: google_authenticator_totp - verify_screen_lock: automatic_5_minute_timeout

during_work: - classify_documents: apply_classification_labels - encrypt_communications: signal_for_sensitive_discussions - vpn_for_aws: wireguard_for_console_access

end_of_day: - log_out_all_systems: close_all_sessions - secure_documents: lock_in_cabinet_or_encrypt - shred_waste: cross_cut_shredder_for_sensitive

Example 2: Public Space Work (Non-Compliant → Corrected)

❌ Non-Compliant:

coffee_shop_work:

  • no_vpn: direct_aws_console_access
  • no_screen_privacy: client_data_visible
  • public_wifi: unencrypted_network

✅ Corrected:

remote_work_controls: location_assessment: - data_classification: only_LOW_MEDIUM_in_public - HIGH_CRITICAL: work_from_home_office_only

required_controls: - screen_privacy_filter: prevents_shoulder_surfing - vpn_required: wireguard_for_business_access - screen_lock: immediate_when_leaving_seat

🔗 Integration

Policies: Acceptable Use, Information Security

Skills: physical-security, mobile-device-management, data-classification

Frameworks: ISO 27001 A.5.10, NIST CSF PR, CIS Control 16.8

📋 Document Control

  • Version: 1.0 | Updated: 2026-02-10

  • License: Apache-2.0

  • Classification:

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

product-documentation

No summary provided by upstream source.

Repository SourceNeeds Review
General

html-css-best-practices

No summary provided by upstream source.

Repository SourceNeeds Review
General

open-source

No summary provided by upstream source.

Repository SourceNeeds Review