Recommended Policies & Guidelines

Intermediate 25-30 minutes

Sample acceptable use policies, internet filtering policies, and procedural guidelines for religious institutions and community organizations.

Prerequisites:

  • Authority to create or recommend policies
  • Understanding of your organization's needs
  • Legal review recommended before finalizing
  • Board/leadership approval process

Why Written Policies Matter

Clear, written policies protect both your organization and your community members. They set expectations, provide legal protection, guide staff responses to incidents, and demonstrate due diligence. Without policies, responses become inconsistent, liability increases, and confusion reigns. This guide provides templates you can adapt to your institution's needs and values.

Legal Disclaimer: These are sample policies for educational purposes. Have all policies reviewed by an attorney familiar with your jurisdiction before implementation. Laws vary by state and country.

📋 Policy Types You Need

1. Acceptable Use Policy (AUP)

Defines appropriate and inappropriate uses of internet/computers

Required for: All institutions providing internet/computer access

2. Internet Filtering Policy

Explains what filtering is in place and why

Required for: Institutions with filtering systems

3. Privacy & Monitoring Policy

Discloses what is monitored and how data is used

Required for: All institutions (legal requirement in many places)

4. Incident Response Procedures

Step-by-step response to policy violations

Required for: Staff and volunteers

5. Device Usage Guidelines

Rules for personal device use on premises

Optional: Useful for comprehensive coverage

📄 Sample Acceptable Use Policy

[Organization Name] - Internet & Computer Acceptable Use Policy

Purpose

[Organization Name] provides internet and computer access to support education, communication, and appropriate personal use. This policy establishes guidelines for acceptable use to maintain a safe, respectful environment consistent with our values.

Scope

This policy applies to all individuals using [Organization Name]'s internet connection or computers, including members, guests, staff, volunteers, and visitors.

Acceptable Uses

Internet and computer resources may be used for:

  • Educational research and learning
  • Work or school-related activities
  • Email and appropriate communication
  • Accessing religious/spiritual resources
  • Job searching and resume preparation
  • General web browsing (subject to filtering)
  • Appropriate social media and entertainment

Prohibited Uses

The following activities are strictly prohibited:

  • Accessing, downloading, storing, or transmitting pornographic, obscene, or sexually explicit material
  • Accessing violent, hateful, or offensive content
  • Illegal activities (piracy, hacking, fraud, harassment, threats)
  • Attempting to bypass content filtering or security measures
  • Installing unauthorized software or modifying system settings
  • Using excessive bandwidth (streaming video, large downloads) in ways that impact others
  • Gambling, including fantasy sports for money
  • Commercial activities without permission
  • Accessing another person's account without authorization
  • Cyberbullying, harassment, or sending threatening communications

User Responsibilities

Users are expected to:

  • Use resources responsibly and ethically
  • Respect time limits when others are waiting
  • Report inappropriate content or behavior to staff immediately
  • Protect their own privacy (don't enter sensitive info on public computers)
  • Log off completely when finished
  • Be respectful of other users and staff

Monitoring & Privacy

Users should have NO expectation of privacy when using [Organization Name]'s internet or computers. We reserve the right to monitor, log, and review internet usage including websites visited, search terms, and time spent online. Monitoring is conducted for security, policy compliance, and protection of minors. Personal content of communications (emails, messages) is generally not reviewed unless there is reason to believe policy violations have occurred.

Filtering

Content filtering is in place to block inappropriate content. While we strive for accurate filtering, no system is perfect. Legitimate sites may occasionally be blocked, and inappropriate content may occasionally not be blocked. Users who encounter incorrectly blocked sites should notify staff. Intentionally accessing inappropriate content, even if not blocked, is a policy violation.

Enforcement

Violations of this policy may result in:

  • Immediate loss of internet/computer privileges
  • Notification of parents/guardians (for minors)
  • Temporary or permanent ban from facility
  • Referral to law enforcement (for illegal activities)

Acknowledgment

By using [Organization Name]'s internet or computers, users acknowledge they have read, understood, and agree to abide by this Acceptable Use Policy.

Effective Date: [Date]
Last Revised: [Date]
Review Schedule: Annually

🔒 Sample Internet Filtering Policy

[Organization Name] - Internet Filtering Policy

Policy Statement

[Organization Name] implements internet content filtering to provide a safe online environment for all users, particularly minors. This policy explains our filtering approach, what is blocked, and procedures for requesting access to blocked sites.

Filtering Technology

We use [DNS filtering / firewall-based filtering / combination] provided by [Service Name] to block access to inappropriate content. Filtering operates automatically at the network level and applies to all devices using our internet connection.

Content Categories Blocked

The following categories of content are blocked:

  • Pornography and sexually explicit content
  • Violence and gore
  • Hate speech and discrimination
  • Illegal drugs and drug paraphernalia
  • Weapons and explosives
  • Illegal activities and crime
  • Gambling
  • Malware and phishing sites
  • [Add other categories specific to your institution]

Content Categories Monitored

The following categories are monitored but not automatically blocked:

  • Social media (case-by-case basis)
  • Gaming and entertainment
  • Streaming video

Limitations of Filtering

Users should understand that:

  • No filtering system is 100% effective
  • Inappropriate content may occasionally appear
  • Legitimate educational content may occasionally be blocked
  • Filtering does not replace supervision and education

Requesting Access to Blocked Sites

If a user believes a legitimate website has been incorrectly blocked:

  1. Notify staff member with the specific URL
  2. Explain the legitimate purpose for accessing the site
  3. Staff will review the request (usually within 24-48 hours)
  4. If approved, site will be added to whitelist
  5. If denied, explanation will be provided

Bypass Attempts

Attempting to bypass filtering through VPNs, proxy sites, or any other means is strictly prohibited and will result in immediate loss of internet privileges and potential disciplinary action.

Parental Rights

Parents/guardians of minors have the right to:

  • Review filtering categories and blocked content
  • Request more restrictive filtering for their child
  • Receive notification if their child attempts to access blocked content
  • Prohibit their child from using our internet entirely

Policy Review

This policy is reviewed annually and updated as technology and community needs evolve.

🔍 Sample Privacy & Monitoring Policy

[Organization Name] - Privacy & Network Monitoring Policy

Purpose

To inform users about what information is collected, how it is monitored, and how privacy is protected when using [Organization Name]'s internet and computer systems.

Information Collected

When using our network, the following information may be logged:

  • Websites visited (domain names, not full URLs or page content)
  • Date and time of internet usage
  • Computer/device identifier (not linked to personal identity unless policy violation)
  • Bandwidth consumed
  • Duration of sessions
  • Attempts to access blocked content

What We DO Monitor

  • Domain names (e.g., facebook.com, youtube.com)
  • Content categories (education, entertainment, blocked content)
  • Network usage patterns (aggregate data)
  • Security threats and suspicious activity

What We DO NOT Monitor

  • Specific page content (HTTPS encrypts this)
  • Personal messages or email content (unless investigating a complaint)
  • Keystrokes or passwords
  • Webcam or microphone

Use of Collected Information

Information collected is used to:

  • Ensure policy compliance
  • Maintain network security and performance
  • Respond to inappropriate behavior or illegal activity
  • Improve services and filtering effectiveness
  • Generate anonymous aggregate statistics

Data Retention

  • Network logs: Retained for [30-90] days, then deleted
  • Incident reports: Retained for [1-3] years
  • Aggregate statistics: Retained indefinitely (anonymous)

Data Sharing

We do NOT sell or share user data with third parties, except:

  • When required by law (subpoena, court order)
  • To law enforcement in cases of illegal activity
  • To parents/guardians of minors regarding policy violations
  • To DNS/filtering service provider (only domain-level data, per their privacy policy)

User Privacy Responsibilities

Users are responsible for protecting their own privacy:

  • Do NOT enter sensitive information (passwords, credit cards, SSN) on public computers
  • Always log out of personal accounts
  • Clear browser history if desired (though system will reset anyway)
  • Use your personal device for sensitive transactions

COPPA Compliance (Children Under 13)

For children under 13, we:

  • Do not collect personal information beyond what is necessary for service
  • Require parental consent for computer/internet use
  • May notify parents of their child's internet activity upon request

Questions or Concerns

Users with privacy questions should contact: [Contact Info]

🚨 Incident Response Procedures (Internal Staff Document)

Response to Inappropriate Internet Use

Level 1: Minor Violations (Accidental or First-Time)

Examples: Accidentally accessing blocked site, minor time limit overage

Response:

  1. Politely remind user of policy
  2. Provide copy of AUP if they don't have one
  3. No further action unless repeated
  4. Log incident in notebook (date, time, user, issue, resolution)

Level 2: Moderate Violations (Intentional but Not Severe)

Examples: Repeated time limit violations, attempting to access blocked sites, rude behavior

Response:

  1. Immediately end user's session
  2. Speak with user privately about violation
  3. Temporary suspension of privileges (3-7 days)
  4. Written warning placed on file
  5. Notify parent/guardian if minor
  6. Require user to acknowledge AUP before restoring access

Level 3: Serious Violations (Dangerous or Illegal)

Examples: Accessing child sexual abuse material, making threats, cyberbullying, hacking attempts, repeated bypass attempts

Response:

  1. Immediately end session and block user
  2. Do NOT confront user alone - get supervisor
  3. Document everything (screenshots if possible, not to be deleted)
  4. Notify director/leadership immediately
  5. Contact law enforcement if illegal activity (CSAM, threats, etc.)
  6. Permanent ban from computer/internet use
  7. Possible ban from facility
  8. Written incident report filed

Special Considerations for Minors

  • Always notify parent/guardian of incidents (even minor)
  • Use developmentally appropriate language when addressing child
  • Consider that child may have been coerced or groomed (don't automatically assume malice)
  • Mandatory reporting may apply if evidence of abuse

Documentation Requirements

For ALL incidents (even Level 1), record:

  • Date and time
  • User identification (if known)
  • Description of incident
  • Staff member who responded
  • Action taken
  • Outcome

Escalation Contacts

  • Immediate Supervisor: [Name, Phone]
  • Director: [Name, Phone]
  • Local Police (Non-Emergency): [Number]
  • Emergency: 911
  • CyberTipline (CSAM): 1-800-843-5678 or cybertipline.org

📱 Sample Personal Device Policy

[Organization Name] - Personal Device Usage Policy

Policy Statement

This policy governs the use of personal smartphones, tablets, and laptops on [Organization Name] premises.

WiFi Access for Personal Devices

  • Personal devices may connect to [Guest WiFi Network Name]
  • Same acceptable use and filtering policies apply
  • Devices must not circumvent filtering (disable VPNs)
  • WiFi password available at [Location]

During Programs & Services

Personal device use during programs, services, or classes:

  • Phones on silent: Required during all gatherings
  • Appropriate use: Religious texts/apps, note-taking, emergency communication only
  • Discouraged use: Social media, games, messaging during programs
  • Photography/video: Requires consent (see photography policy)

Youth Programs

For children and teen programs:

  • Personal devices collected at start of program (optional policy)
  • OR: Devices allowed but supervised use only
  • No photography of other children without parent permission
  • Consequences for misuse: Parent notification, device confiscation

Staff/Volunteer Device Use

  • Personal device use limited during work hours
  • No photographing or posting about congregation members without consent
  • Maintain professional boundaries on social media

✅ Implementation Checklist

Policy Development

  • ☐ Adapt templates to your organization's needs
  • ☐ Review with leadership/board
  • ☐ Have attorney review (highly recommended)
  • ☐ Get official approval/adoption
  • ☐ Set effective date and review schedule

Communication

  • ☐ Post policies visibly near computers/WiFi access
  • ☐ Include in new member/visitor information
  • ☐ Add to website
  • ☐ Announce during services/meetings
  • ☐ Provide copies upon request
  • ☐ Multi-language versions if needed

Training

  • ☐ Train all staff on policies
  • ☐ Train volunteers who monitor computer use
  • ☐ Provide incident response procedures
  • ☐ Conduct annual refresher training

Enforcement

  • ☐ Designate who is responsible for enforcement
  • ☐ Create incident log system
  • ☐ Establish escalation procedures
  • ☐ Review incidents quarterly

Review

  • ☐ Schedule annual policy review
  • ☐ Update as technology/needs evolve
  • ☐ Collect feedback from staff and users
  • ☐ Monitor effectiveness