Acceptable Use Policy Violation Investigation Procedure (AC-PROC-001)

1. Purpose

To define the process for investigating, documenting, and responding to reported violations of the network acceptable use policy.

2. Scope

This procedure applies to all workforce members and all reported or detected violations of the Network Acceptable Use Policy (AC-POL-002).

3. Overview

This procedure outlines the steps for responding to potential violations of the acceptable use policy, from initial report and investigation through to documentation and sanctioning, ensuring a consistent and fair process.

4. Procedure

Provide the detailed, step-by-step instructions for carrying out the procedure. The table format is standard.

Step Who What
1 Reporter (User or Automated System) A potential violation is reported by a user or detected by an automated system.
2 IT Department & Security Officer Investigate the report to validate the violation and assess its impact.
3 IT Department or Security Officer The employee’s manager is notified.
4 Manager & Human Resources In consultation with HR, a sanction is determined consistent with the Sanction Policy.
5 Security Officer/IT Department The outcome is formally documented.

Note: If the security team determines that the violation is critical, an incident post-mortem may be initiated to analyze the incident in detail.

5. Standards Compliance

This section maps the procedure steps to specific controls from relevant information security standards.

Procedure Step(s) Standard/Framework Control Reference
1-5 SOC 2 CC6.8
1-5 HIPAA 45 CFR § 164.308(a)(5)(ii)(B)

6. Artifact(s)

A completed policy violation investigation report.

7. Definitions

N/A

8. Responsibilities

Clearly assign responsibility for various aspects of the procedure.

Role Responsibility
Reporter Any workforce member responsible for reporting suspected policy violations.
IT Department Investigates reported violations, validates their authenticity, and assesses technical impact.
Security Officer Oversees the investigation process and ensures compliance with security policies.
Managers Notified of violations by their direct reports and participate in determining appropriate sanctions.
Human Resources Consulted on sanctions to ensure consistency with company policy and legal requirements.