Internet & Email Acceptable Use

Stay within corporate internet and email policies.

What You'll Learn

Training Steps

  1. Late Night at Northgate Financial

    Welcome to Northgate Financial Services! You are Alice, an investment analyst who researches market trends and prepares client reports. It's 7 PM on a Wednesday — you're working late to finish the Q3 Client Portfolio Analysis, due first thing tomorrow morning. The office is mostly empty.

  2. A Helpful Tip

    Alice's phone buzzes. It's a message from Jake Torres — a friend and former colleague who now works at a hedge fund.

  3. Visiting CryptoPulse

    Alice opens CryptoPulse in her work browser. The site looks professional — market charts, analysis tools, portfolio tracking. It doesn't look like a shady crypto site at all. But Northgate's acceptable use policy explicitly prohibits cryptocurrency platforms on company networks, regardless of how professional they appear.

  4. The Free Toolkit

    A banner on the site offers a 'Free Market Insight Toolkit.' Alice thinks it could help with her analysis. She clicks download without thinking twice.

  5. The Download Warning

    The company's endpoint protection flags the download. A warning pops up — but Alice is in a rush and dismisses it. 'It's just a false positive,' she thinks. 'Jake uses this tool every day.'

  6. The Shortcut Home

    It's getting late. Alice decides to email the Q3 report draft to her personal email to finish at home. She sends the confidential Q3_Client_Portfolio_Analysis.xlsx to alice.morgan.personal@gmail.com. 'It's faster than the secure file transfer,' she tells herself. The report contains confidential client portfolio values, investment strategies, and personal financial details.

  7. A Productive Evening

    Alice finishes the report at home and comes in the next morning feeling accomplished. The Q3 analysis is done, the deadline is met. Everything seems fine.

  8. IT Security at Your Desk

    Alice arrives at work to find an email from IT Security already waiting. Her stomach drops.

  9. The DLP Dashboard

    Alice clicks the link in the email and logs in to the Compliance Portal to review the DLP alerts.

  10. What the System Caught

    The DLP Alert Dashboard reveals three separate violations from last night. Every shortcut Alice took was logged and flagged.