
Most MSPs think cybersecurity starts with tools—firewalls, MDR, backups. But there’s a silent killer in your stack: the lack of an Acceptable Use Policy (AUP). You probably have one. Maybe it’s buried in your documentation platform. Maybe your client signed it three years ago. But if it’s not current, enforced, and tied to user-level accountability, it’s a ticking time bomb.
Let’s break down why this policy matters more than ever and what’s at stake if you get it wrong.
Insurance Demands It, But That’s Just the Start
Cyber liability insurers aren’t just looking at whether your clients have EDR or MFA anymore. They’re asking if you have policies, specifically Acceptable Use Policies that employees have read, signed, and understood. Why? Because if there's no proof of enforcement, the insurer may deny claims outright.
44 percent of cyber insurance claims are already being denied. Many of those denials cite failures in minimum required controls, and an AUP is often at the top of that list. It’s not enough for your clients to say they had controls in place. They must prove that users were aware of expectations, acknowledged them, and violated them anyway.
You need more than a checkbox. You need a record. AUPs create the paper trail that lets insurers and courts know you did your job.
The Legal Trap: “We Didn’t Know That Was Against the Rules”
Here’s the scenario: a client employee downloads shadow IT software, disables endpoint protection, and accidentally exposes sensitive data. When regulators investigate—or worse, when the client sues you—they’ll claim they didn’t know those actions were prohibited.
And if there’s no signed AUP on file?
You’re the one left holding the bag.
That’s not theory. That’s happening right now. One MSP was dragged into a seven-figure legal dispute after a ransomware attack. The client’s CFO claimed they were never warned about specific risky behaviors. Despite the MSP’s best practices, the lack of user-facing documentation and sign-off left them legally exposed.
Policies don’t just protect clients from risk. They protect you from liability.
Five High-Risk Areas AUPs Must Address
If your Acceptable Use Policy is generic or outdated, it’s likely missing the high-risk behaviors that cause real-world incidents. Here are the top five areas you must cover:
- Remote Work Security
Users accessing networks from unsecured home routers, public Wi-Fi, or personal devices open the door to credential theft, data leakage, and malware. - Credential Sharing
Shared logins are still shockingly common in small businesses. AUPs must explicitly ban this and define consequences for violations. - Unauthorized Software Use
Downloading Chrome extensions, chat apps, or pirated software can circumvent even the best endpoint protection. - Data Handling and Storage
Employees must be instructed where and how they are allowed to store sensitive information, especially in regulated industries. - Social Media and Personal Use
Even off-hours social media behavior can become a reputational risk. Define boundaries clearly.
AUPs aren’t about micromanaging employees. They’re about documenting the line between intentional misuse and honest mistakes, so you have evidence when the blame game begins.
AUPs Mean Nothing Without Enforcement and Evidence
Here’s where most MSPs fail: they create the policy but don’t operationalize it. A piece of paper or a PDF in SharePoint is worthless without a system for:
- Collecting signatures from every user, not just the client’s leadership
- Reviewing and re-signing the policy at regular intervals (at least annually)
- Tracking version history so you can prove which policy was in effect during an incident
- Logging violations and documenting any user training or remediation provided
If you can’t produce these records during an audit, insurance dispute, or lawsuit, it doesn’t matter that you had a policy in place. From a liability perspective, it might as well not exist.
Compliance Isn't Enough, You Need Provable Security
Many MSPs still think, “We’re HIPAA compliant” or “We passed our SOC 2 audit” means they’re safe. But the breach doesn’t care about your audit badge and neither do lawyers.
Policies are only defensible when they’re connected to evidence.
As Bruce McCully explains in Standardized, MSPs are being sued not for failing to secure clients, but for failing to prove that they advised and warned them properly. An Acceptable Use Policy with tracked acknowledgments is a cornerstone of that proof.
From Internal Control to Client Conversation
Before you talk to your clients about Acceptable Use Policies, you need to get your own house in order.
- Start with your internal team. Do all your employees have signed AUPs on file?
- Do you test their understanding through simulated phishing or training reviews?
- Can you pull a report of policy violations and how they were handled?
If not, fix that first. Then use the same playbook to introduce AUPs as a client-facing service. Position it as part of your Cyber Liability Guard or compliance stack, not a standalone document, but an integral piece of their legal and operational defense system.
Here’s how to lead that conversation:
“If one of your employees clicks a phishing link, downloads ransomware, or violates your data handling policies, could you prove to an insurer or regulator that they had been properly warned—not just by you, but by policy?”
If the answer is no, your client has exposure. And so do you.
Remember… If It’s Not Signed, It Doesn’t Exist
You can have every security control in the world. But if an employee disables it or circumvents it, and there’s no signed Acceptable Use Policy holding them accountable, the MSP is usually the one blamed.
You cannot afford that.
So stop treating AUPs like a low-priority checkbox. Treat them like what they are: legal evidence, cyber insurance requirements, and user accountability mechanisms.
Build the policy. Get the signatures. Track the violations.
And when your clients see how serious you take it internally, they’ll understand it’s not just a policy, it’s protection.