IT AND INTERNET USAGE POLICY
Archana & Arjun’s 32 Ventures LLP
- Purpose
This policy ensures responsible, secure and ethical use of all IT systems, devices, internet access,
and digital communication tools within the organization.
- Scope
Applies to all employees, visiting doctors, interns, trainees, contract staff and anyone using the
organization’s IT resources.
- Acceptable Use
Employees may use computers, internet and digital systems strictly for work-related activities
including patient management, communication, documentation, research and administrative tasks.
- Limited Personal Use
Reasonable personal use is allowed as long as it does not interfere with work, does not break
confidentiality rules, and does not involve inappropriate, illegal or offensive content.
- Prohibited Activities
- Downloading or accessing pirated content
- Visiting inappropriate, discriminatory or illegal websites
- Using the organization’s network for personal business or financial gain
- Installing unapproved software or apps
- Sharing confidential files through personal email or devices
- Using USB drives or external devices without permission
- Email and Communication Etiquette
- Use official email for all work communications
- Do not forward patient information to personal mail
- Avoid aggressive, abusive or unprofessional communication
- Verify unknown email senders to avoid phishing attacks
- Data Security Guidelines
- Keep passwords confidential
- Use strong passwords and update them regularly
- Do not leave systems unlocked when unattended
- Report suspicious emails or malware immediately• Use only authorized software and cloud services
- Use of Mobile Phones
- Personal phones should not be used for patient photographs or data
- Phones must be kept on silent in clinical areas
- Downloading patient data onto personal devices is strictly prohibited
- Monitoring
The organization reserves the right to monitor internet usage, email logs, system activity and
downloads to ensure compliance.
- Data Backup and Storage
- Store all patient records on approved digital platforms only
- Do not store files locally on desktops or personal drives
- Backup procedures must be followed as instructed
- Cybersecurity Training
Staff must participate in periodic IT security and data protection training.
- Reporting Violations
Any misuse, suspicious activity, malware, or potential breach must be reported immediately to
management.
- Disciplinary Action
Violation of this policy may result in warnings, suspension, termination, or legal action.
- Review
This policy will be reviewed annually or when new technologies or risks arise.
