The purpose of this policy is to outline the acceptable use of computer equipment at your company. These rules are in place to protect the employee and your company. Inappropriate use exposes your company to risks including virus attacks, compromise of network systems and services, and legal issues.