Recommended Policies & Guidelines
Sample acceptable use policies, internet filtering policies, and procedural guidelines for religious institutions and community organizations.
Prerequisites:
- • Authority to create or recommend policies
- • Understanding of your organization's needs
- • Legal review recommended before finalizing
- • Board/leadership approval process
Why Written Policies Matter
Clear, written policies protect both your organization and your community members. They set expectations, provide legal protection, guide staff responses to incidents, and demonstrate due diligence. Without policies, responses become inconsistent, liability increases, and confusion reigns. This guide provides templates you can adapt to your institution's needs and values.
📋 Policy Types You Need
1. Acceptable Use Policy (AUP)
Defines appropriate and inappropriate uses of internet/computers
Required for: All institutions providing internet/computer access
2. Internet Filtering Policy
Explains what filtering is in place and why
Required for: Institutions with filtering systems
3. Privacy & Monitoring Policy
Discloses what is monitored and how data is used
Required for: All institutions (legal requirement in many places)
4. Incident Response Procedures
Step-by-step response to policy violations
Required for: Staff and volunteers
5. Device Usage Guidelines
Rules for personal device use on premises
Optional: Useful for comprehensive coverage
📄 Sample Acceptable Use Policy
[Organization Name] - Internet & Computer Acceptable Use Policy
Purpose
[Organization Name] provides internet and computer access to support education, communication, and appropriate personal use. This policy establishes guidelines for acceptable use to maintain a safe, respectful environment consistent with our values.
Scope
This policy applies to all individuals using [Organization Name]'s internet connection or computers, including members, guests, staff, volunteers, and visitors.
Acceptable Uses
Internet and computer resources may be used for:
- Educational research and learning
- Work or school-related activities
- Email and appropriate communication
- Accessing religious/spiritual resources
- Job searching and resume preparation
- General web browsing (subject to filtering)
- Appropriate social media and entertainment
Prohibited Uses
The following activities are strictly prohibited:
- Accessing, downloading, storing, or transmitting pornographic, obscene, or sexually explicit material
- Accessing violent, hateful, or offensive content
- Illegal activities (piracy, hacking, fraud, harassment, threats)
- Attempting to bypass content filtering or security measures
- Installing unauthorized software or modifying system settings
- Using excessive bandwidth (streaming video, large downloads) in ways that impact others
- Gambling, including fantasy sports for money
- Commercial activities without permission
- Accessing another person's account without authorization
- Cyberbullying, harassment, or sending threatening communications
User Responsibilities
Users are expected to:
- Use resources responsibly and ethically
- Respect time limits when others are waiting
- Report inappropriate content or behavior to staff immediately
- Protect their own privacy (don't enter sensitive info on public computers)
- Log off completely when finished
- Be respectful of other users and staff
Monitoring & Privacy
Users should have NO expectation of privacy when using [Organization Name]'s internet or computers. We reserve the right to monitor, log, and review internet usage including websites visited, search terms, and time spent online. Monitoring is conducted for security, policy compliance, and protection of minors. Personal content of communications (emails, messages) is generally not reviewed unless there is reason to believe policy violations have occurred.
Filtering
Content filtering is in place to block inappropriate content. While we strive for accurate filtering, no system is perfect. Legitimate sites may occasionally be blocked, and inappropriate content may occasionally not be blocked. Users who encounter incorrectly blocked sites should notify staff. Intentionally accessing inappropriate content, even if not blocked, is a policy violation.
Enforcement
Violations of this policy may result in:
- Immediate loss of internet/computer privileges
- Notification of parents/guardians (for minors)
- Temporary or permanent ban from facility
- Referral to law enforcement (for illegal activities)
Acknowledgment
By using [Organization Name]'s internet or computers, users acknowledge they have read, understood, and agree to abide by this Acceptable Use Policy.
Effective Date: [Date]
Last Revised: [Date]
Review Schedule: Annually
🔒 Sample Internet Filtering Policy
[Organization Name] - Internet Filtering Policy
Policy Statement
[Organization Name] implements internet content filtering to provide a safe online environment for all users, particularly minors. This policy explains our filtering approach, what is blocked, and procedures for requesting access to blocked sites.
Filtering Technology
We use [DNS filtering / firewall-based filtering / combination] provided by [Service Name] to block access to inappropriate content. Filtering operates automatically at the network level and applies to all devices using our internet connection.
Content Categories Blocked
The following categories of content are blocked:
- Pornography and sexually explicit content
- Violence and gore
- Hate speech and discrimination
- Illegal drugs and drug paraphernalia
- Weapons and explosives
- Illegal activities and crime
- Gambling
- Malware and phishing sites
- [Add other categories specific to your institution]
Content Categories Monitored
The following categories are monitored but not automatically blocked:
- Social media (case-by-case basis)
- Gaming and entertainment
- Streaming video
Limitations of Filtering
Users should understand that:
- No filtering system is 100% effective
- Inappropriate content may occasionally appear
- Legitimate educational content may occasionally be blocked
- Filtering does not replace supervision and education
Requesting Access to Blocked Sites
If a user believes a legitimate website has been incorrectly blocked:
- Notify staff member with the specific URL
- Explain the legitimate purpose for accessing the site
- Staff will review the request (usually within 24-48 hours)
- If approved, site will be added to whitelist
- If denied, explanation will be provided
Bypass Attempts
Attempting to bypass filtering through VPNs, proxy sites, or any other means is strictly prohibited and will result in immediate loss of internet privileges and potential disciplinary action.
Parental Rights
Parents/guardians of minors have the right to:
- Review filtering categories and blocked content
- Request more restrictive filtering for their child
- Receive notification if their child attempts to access blocked content
- Prohibit their child from using our internet entirely
Policy Review
This policy is reviewed annually and updated as technology and community needs evolve.
🔍 Sample Privacy & Monitoring Policy
[Organization Name] - Privacy & Network Monitoring Policy
Purpose
To inform users about what information is collected, how it is monitored, and how privacy is protected when using [Organization Name]'s internet and computer systems.
Information Collected
When using our network, the following information may be logged:
- Websites visited (domain names, not full URLs or page content)
- Date and time of internet usage
- Computer/device identifier (not linked to personal identity unless policy violation)
- Bandwidth consumed
- Duration of sessions
- Attempts to access blocked content
What We DO Monitor
- Domain names (e.g., facebook.com, youtube.com)
- Content categories (education, entertainment, blocked content)
- Network usage patterns (aggregate data)
- Security threats and suspicious activity
What We DO NOT Monitor
- Specific page content (HTTPS encrypts this)
- Personal messages or email content (unless investigating a complaint)
- Keystrokes or passwords
- Webcam or microphone
Use of Collected Information
Information collected is used to:
- Ensure policy compliance
- Maintain network security and performance
- Respond to inappropriate behavior or illegal activity
- Improve services and filtering effectiveness
- Generate anonymous aggregate statistics
Data Retention
- Network logs: Retained for [30-90] days, then deleted
- Incident reports: Retained for [1-3] years
- Aggregate statistics: Retained indefinitely (anonymous)
Data Sharing
We do NOT sell or share user data with third parties, except:
- When required by law (subpoena, court order)
- To law enforcement in cases of illegal activity
- To parents/guardians of minors regarding policy violations
- To DNS/filtering service provider (only domain-level data, per their privacy policy)
User Privacy Responsibilities
Users are responsible for protecting their own privacy:
- Do NOT enter sensitive information (passwords, credit cards, SSN) on public computers
- Always log out of personal accounts
- Clear browser history if desired (though system will reset anyway)
- Use your personal device for sensitive transactions
COPPA Compliance (Children Under 13)
For children under 13, we:
- Do not collect personal information beyond what is necessary for service
- Require parental consent for computer/internet use
- May notify parents of their child's internet activity upon request
Questions or Concerns
Users with privacy questions should contact: [Contact Info]
🚨 Incident Response Procedures (Internal Staff Document)
Response to Inappropriate Internet Use
Level 1: Minor Violations (Accidental or First-Time)
Examples: Accidentally accessing blocked site, minor time limit overage
Response:
- Politely remind user of policy
- Provide copy of AUP if they don't have one
- No further action unless repeated
- Log incident in notebook (date, time, user, issue, resolution)
Level 2: Moderate Violations (Intentional but Not Severe)
Examples: Repeated time limit violations, attempting to access blocked sites, rude behavior
Response:
- Immediately end user's session
- Speak with user privately about violation
- Temporary suspension of privileges (3-7 days)
- Written warning placed on file
- Notify parent/guardian if minor
- Require user to acknowledge AUP before restoring access
Level 3: Serious Violations (Dangerous or Illegal)
Examples: Accessing child sexual abuse material, making threats, cyberbullying, hacking attempts, repeated bypass attempts
Response:
- Immediately end session and block user
- Do NOT confront user alone - get supervisor
- Document everything (screenshots if possible, not to be deleted)
- Notify director/leadership immediately
- Contact law enforcement if illegal activity (CSAM, threats, etc.)
- Permanent ban from computer/internet use
- Possible ban from facility
- Written incident report filed
Special Considerations for Minors
- Always notify parent/guardian of incidents (even minor)
- Use developmentally appropriate language when addressing child
- Consider that child may have been coerced or groomed (don't automatically assume malice)
- Mandatory reporting may apply if evidence of abuse
Documentation Requirements
For ALL incidents (even Level 1), record:
- Date and time
- User identification (if known)
- Description of incident
- Staff member who responded
- Action taken
- Outcome
Escalation Contacts
- Immediate Supervisor: [Name, Phone]
- Director: [Name, Phone]
- Local Police (Non-Emergency): [Number]
- Emergency: 911
- CyberTipline (CSAM): 1-800-843-5678 or cybertipline.org
📱 Sample Personal Device Policy
[Organization Name] - Personal Device Usage Policy
Policy Statement
This policy governs the use of personal smartphones, tablets, and laptops on [Organization Name] premises.
WiFi Access for Personal Devices
- Personal devices may connect to [Guest WiFi Network Name]
- Same acceptable use and filtering policies apply
- Devices must not circumvent filtering (disable VPNs)
- WiFi password available at [Location]
During Programs & Services
Personal device use during programs, services, or classes:
- Phones on silent: Required during all gatherings
- Appropriate use: Religious texts/apps, note-taking, emergency communication only
- Discouraged use: Social media, games, messaging during programs
- Photography/video: Requires consent (see photography policy)
Youth Programs
For children and teen programs:
- Personal devices collected at start of program (optional policy)
- OR: Devices allowed but supervised use only
- No photography of other children without parent permission
- Consequences for misuse: Parent notification, device confiscation
Staff/Volunteer Device Use
- Personal device use limited during work hours
- No photographing or posting about congregation members without consent
- Maintain professional boundaries on social media
✅ Implementation Checklist
Policy Development
- ☐ Adapt templates to your organization's needs
- ☐ Review with leadership/board
- ☐ Have attorney review (highly recommended)
- ☐ Get official approval/adoption
- ☐ Set effective date and review schedule
Communication
- ☐ Post policies visibly near computers/WiFi access
- ☐ Include in new member/visitor information
- ☐ Add to website
- ☐ Announce during services/meetings
- ☐ Provide copies upon request
- ☐ Multi-language versions if needed
Training
- ☐ Train all staff on policies
- ☐ Train volunteers who monitor computer use
- ☐ Provide incident response procedures
- ☐ Conduct annual refresher training
Enforcement
- ☐ Designate who is responsible for enforcement
- ☐ Create incident log system
- ☐ Establish escalation procedures
- ☐ Review incidents quarterly
Review
- ☐ Schedule annual policy review
- ☐ Update as technology/needs evolve
- ☐ Collect feedback from staff and users
- ☐ Monitor effectiveness