Click HERE to Read Cyber Sainik’s Response to Crisis in Ukraine

Security as a Service For All Businesses

Email

info@cybersainik.com

Acceptable Use Policy

5. Hacking: The use of the Services for hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network.

6. Threatening Material or Content: The Services shall not be used to host, post, transmit, or retransmit any content or material that harasses, or threatens the health or safety of others. In addition, CS, LLC reserves the right to decline to provide Services if the content is determined by CS, LLC to be obscene, indecent, hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.

7. Violation of Intellectual Property Rights: The Services shall not be used to publish, submit/receive, upload/download, post, use, copy or otherwise reproduce, transmit, retransmit, distribute or store any content/material or to engage in any activity that infringes, misappropriates or otherwise violates the intellectual property rights or privacy or publicity rights of CS, LLC or any other party, including but not limited to any rights protected by any copyright, patent, trademark laws, trade secret, trade dress, right of privacy, right of publicity, moral rights or other intellectual property right now known or later recognized by statute, judicial decision or regulation.

8. Distribution of Malware: The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by CS, LLC on a case by case basis.

9. Phishing: Any activity designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any activity related to phishing activities may result in the immediate suspension of Customer’s account.

10. Violation of Agreements relating for Third Party Services: Any activity which violates any Third Party Service Agreement.

11. Denial of Service: Any activity to implement or assist in the implementation of denial of service attack. CS, LLC absolutely prohibits the use of Services for the origination, propagation or control of denial of service attacks (“DoS”) or distributed denial of service attacks (“DDoS”). Customers may not utilize the Services to perform DoS or DDoS mitigation activities (such as service proxying or data scrubbing) which may result in attracting inbound denial of service attacks toward the Services. Any relation to DoS or DDoS type activity is a direct violation of this AUP.

12. Other Activities: Other activities, whether lawful or unlawful, that CS, LLC, in its sole discretion, determines to be harmful to its Customers, operations or reputation, including any activities that restrict or inhibit any other Customer from using the Services.

Reporting Violation of the Acceptable Use Policy: CS, LLC accepts reports of alleged violations of this AUP via email sent to support@cybersainik.com. Reports of alleged violations must be verified and must include the name and contact information of the complaining party, and the IP address or website allegedly in violation, and a description of the alleged violation. Unless otherwise required by law, CS, LLC owes no duty to Third Parties reporting alleged violations. CS, LLC will review all verified Third Party reports and will take such actions as it deems appropriate in its sole discretion. CS, LLC will comply with and respond to valid (as CS, LLC determines in its sole discretion) subpoenas, warrants, and/or court orders. If permitted by applicable law or regulation, CS, LLC will forward such subpoenas, warrants, and/or orders to Customer and Customer may respond; however, CS, LLC reserves the right to respond to any such subpoena, warrant and/or order if it is the named party in such subpoena, warrant, and/or order.

Methods of Resolution for Violations of CS, LLC’s Acceptable use Policy. The goal of our Methods of Resolution is to mitigate service interruptions while resolving potential violations under this AUP. The Methods of Resolution is provided for informational purposes only and forms the framework and guidance with respect to resolving potential violations, but in the event of any conflicts between the Acceptable Use Policy (in particular its enforcement) and the Master Services Agreement or Service Schedule, the Master Services Agreement or Service Schedule shall control. Timing for resolution differs according to the degree of the violation, the nature of the violation, involvement of law enforcement, involvement of third party litigation, or other related factors.

Step 1: First alleged violation of AUP: CS, LLC shall issue a Notice of Potential Violation to the Customer with information regarding the potential violation of CS, LLC’s AUP. This is often a fact-finding email or letter requiring further information or notifying Customer of the potential violation and the required actions to resolve the issue.

Step 2: Acknowledgement of violation of AUP: CS, LLC shall provide the Customer with a Notice of Violation, including information specific to the violation. The Notice of Violation will also include any additional facts about the situation and will notify Customer of the action required to resolve the violation. CS, LLC has the sole discretion to determine which action is appropriate under the circumstances.

Step 3: Failure to address and resole violation: if Customer fails to address the violation AND fails to resolve the violation, a suspension of services may occur. This is a last resort for CS, LLC and only results when the Customer completely fails to participate in CS, LLC’s resolution process. A permanent suspension of services includes reclamation of all dedicated services and the destruction of Customer’s data. CS, LLC may take action immediately without regard to any cure periods that may be set forth in the applicable Service Schedule or Master Services Agreement.

Disclaimer: CS, LLC retains the right, at its sole discretion, to refuse new Service to any individual, group, or business. CS, LLC also retains the right to discontinue Service to Customers with excessive and/or multiple repeated violations.

Contact Us

303-867-7500

5299 DTC Blvd., 5th Floor, Denver Tech Center, Denver, CO 80111

Get Started

Click the button below to schedule your consultation with one of our cybersecurity experts
About Us
Contact Info

5299 DTC Blvd.
Suite 510
Greenwood Village, CO 80111