Ƶ

Aup Agreement Template for Philippines

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Aup Agreement

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Aup Agreement

"I need an AUP Agreement for my cloud computing services company based in Manila, covering standard security protocols and data privacy requirements for business clients, with specific provisions for third-party integrations and API usage."

Document background
The Acceptable Use Policy (AUP) Agreement is essential for organizations providing or utilizing digital services in the Philippines. This document is typically implemented when establishing new IT services, onboarding users, or updating existing digital access policies. The AUP Agreement incorporates requirements from key Philippine legislation, including the Data Privacy Act of 2012 (RA 10173), Cybercrime Prevention Act of 2012 (RA 10175), and E-Commerce Act of 2000 (RA 8792). It details acceptable use parameters, security protocols, data protection measures, user obligations, and compliance requirements. The agreement serves as a protective mechanism for service providers while ensuring users understand their rights, responsibilities, and the consequences of policy violations.
Suggested Sections

1. Parties: Identification of the service provider and the user/organization to whom the AUP applies

2. Background: Context of the agreement, including the nature of services provided and purpose of the AUP

3. Definitions: Clear definitions of technical terms, services, and key concepts used throughout the agreement

4. Scope of Services: Detailed description of the services covered by the AUP

5. Acceptable Use Terms: Specific rules and guidelines for acceptable use of the services

6. Prohibited Activities: Explicit listing of forbidden activities and behaviors

7. Security Requirements: Mandatory security measures and practices users must follow

8. Data Privacy and Protection: Terms relating to data handling and privacy compliance with Philippine Data Privacy Act

9. User Responsibilities: Specific obligations and duties of users when utilizing the services

10. Monitoring and Enforcement: Details of how compliance will be monitored and violations addressed

11. Consequences of Violation: Specific penalties and actions for breach of the AUP

12. Term and Termination: Duration of the agreement and conditions for termination

13. Governing Law: Specification of Philippine law as governing law and jurisdiction

Optional Sections

1. Service Level Commitments: Include when specific service levels are guaranteed as part of the agreement

2. Third Party Access: Include when users may grant access to third parties or contractors

3. Industry-Specific Compliance: Include when the AUP applies to regulated industries with specific compliance requirements

4. Emergency Changes: Include when provider needs right to make immediate changes for security or regulatory compliance

5. Bandwidth and Resource Usage: Include when services have specific resource limitations or restrictions

6. Content Guidelines: Include when users can create or upload content to the service

Suggested Schedules

1. Schedule A - Acceptable Use Standards: Detailed technical specifications and standards for acceptable use

2. Schedule B - Security Requirements: Detailed security protocols and requirements

3. Schedule C - Fee Schedule: If applicable, details of any fees or charges for service usage

4. Appendix 1 - Incident Response Procedures: Step-by-step procedures for handling security incidents or violations

5. Appendix 2 - Technical Requirements: Specific technical requirements for using the service

6. Appendix 3 - Contact Information: Key contacts for support, violations reporting, and escalation procedures

Authors

Alex Denne

Head of Growth (Open Source Law) @ Ƶ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions












































Clauses






























Relevant Industries

Information Technology

Telecommunications

Financial Services

Healthcare

Education

E-commerce

Professional Services

Government

Manufacturing

Media and Entertainment

Cloud Services

Retail

Relevant Teams

Legal

Information Technology

Information Security

Compliance

Risk Management

Human Resources

Operations

Digital Services

Privacy

Infrastructure

Technical Support

Corporate Communications

Relevant Roles

Chief Information Officer

IT Director

Information Security Manager

Compliance Officer

Legal Counsel

System Administrator

Network Manager

Data Protection Officer

Risk Manager

IT Security Analyst

Operations Manager

Human Resources Director

Digital Services Manager

Chief Technology Officer

Privacy Officer

Industries






Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

Email And Internet Usage Policy

A policy document governing email and internet usage in Philippine organizations, ensuring compliance with local data privacy and cybersecurity laws.

find out more

Aup Agreement

A Philippine-compliant legal agreement defining acceptable use terms and conditions for IT services, including security requirements and user responsibilities under local data privacy and cybercrime laws.

find out more

Acceptable Use Agreement

A Philippine-compliant Acceptable Use Agreement outlining terms and conditions for digital service usage, incorporating local data privacy and cybersecurity requirements.

find out more

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

ұԾ’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ұԾ’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.