Our Acceptable Use Policy is to ensure all our Clients have access to their services and to safeguard the security and integrity of the systems and networks we use. It also sets out the rules that apply to our Clients which are required by our upstream suppliers or third-party providers. When we refer to our Services we mean all services provided to our Clients from CyberSquad IT Consulting.
Application (what it applies to, which would essentially be all our services)
Our Acceptable Use Policy applies to ensure all services provided to you by CyberSquad IT Consulting are used in a lawful, fair, responsible, and not un-reasonable way. ‘Unreasonable Use’ means use that is excessive, unacceptable or unintended.
Our Acceptable Use Policy also extends to anyone who uses any of the services supplied by CyberSquad IT Consulting (with or without your consent).
You mustn’t use any CyberSquad IT Consulting services in an unintended way. Your use of a service will be considered unintended if you use it in a way which isn’t for the purpose of which the service was intended for.
Unintended use includes (however isn’t limited to) the following:
You mustn’t use CyberSquad IT Consulting services in an unacceptable way. Your use of any service will be considered unacceptable if you use the service, or any equipment or device for any fraudulent, malicious, illegal or unlawful purpose or in any way which creates risks to the performance, security or integrity of any network or system or to the health or safety of any person, or improperly interferes with the network or another Client/Persons use of our services.
Unacceptable Use for any fraudulent, malicious, illegal or unlawful purpose includes (but is not limited to) the following:
Unacceptable Use that creates risk to, or interferes with, our systems or another persons use or their safety includes (but is not limited to):
Unacceptable use that causes Excessive Use of any Service/Services supplied by CyberSquad IT Consulting includes (but is not limited to):
CyberSquad IT Consulting reserves the right to apply our Acceptable Use Policy at our discretion and on a case-by-case basis and reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions.
We will monitor your use of a service/services to ensure you comply with this Acceptable Use Policy. Any breaches to this Acceptable Use Policy will result in the disabling of a service/services if we deem necessary, at our sole discretion.
Upon closing of a Client’s account, we will send an e-mail notification to the customer, stating the reason for the termination and quoting our terms’ that have been violated. The Client will be given an opportunity to respond and take measures to remedy the situation should he/she consider him/herself abused by a third party. Upon fulfilling of this obligation, we may re-activate the customer’s account, if we find, at our own discretion, sufficient evidence pro customer’s side.
Closed accounts due to repeated violations will not be re-activated. A backup may be requested; however, you will allow us up to 2 business days to provide it.
If you need to report a violation of this AUP agreement or believe that you or your system has been subject to attack originating from our services, please contact us immediately. Our professional team will investigate the situation and provide you with full assistance.
CyberSquad IT Consulting are always making efforts to ensure the security and integrity of our service/services, we can’t and don’t guarantee that viruses and other detrimental programs will not be distributed via our network via breaches to our Acceptable Use Policy.
You are responsible as our Client to maintain the security of your service/services by protecting your onsite network, computers, devices against things such as (but not limited to) viruses, worms, trojans and other malicious programs, and lower-level Denial of Service (DOS) attacks that can be distributed or via the internet, including emails.
Protection methods recommended by CyberSquad IT Consulting include firewalls, individual endpoint/server protection, and multi-factor authentication.
CyberSquad IT Consulting reserve our right to change this Acceptable Use Policy at any time, without prior notice. We encourage our Client’s and Users to review this Acceptable Use Policy via our website regularly.
x