Skip to main content Scroll Top

Acceptable Use Policy

7-1
  • Home
  • Acceptable Use Policy
7-2

Effective Date: January 13, 2025

This Acceptable Use Policy (“AUP”) outlines the rules and guidelines for using the website, services, and resources provided by Defender IT Consulting. By using our website or engaging our services, you agree to comply with this policy.

1. Purpose

This policy exists to protect Defender IT Consulting, our clients, and our partners from illegal, harmful, or inappropriate activities. We are committed to maintaining a secure and professional environment for all users.

2. Prohibited Activities

You agree not to engage in any of the following prohibited activities: Illegal Activities: Any use of our website or services for activities that violate local, state, federal, or international laws. Unauthorized Access: Attempting to gain unauthorized access to our systems, networks, accounts, or data. Malicious Software: Uploading, transmitting, or distributing viruses, malware, ransomware, spyware, or any other malicious code. Network Abuse: Engaging in activities that disrupt, degrade, or interfere with the operation of our website, servers, or networks. Data Mining: Using automated tools, bots, or scripts to scrape, harvest, or collect data from our website without authorization. Impersonation: Misrepresenting your identity, impersonating another person or entity, or falsely claiming affiliation with Defender IT Consulting. Harassment: Engaging in harassment, threats, defamation, or any conduct that creates a hostile environment. Intellectual Property Infringement: Using, copying, or distributing copyrighted materials, trademarks, or proprietary information without proper authorization.

3. Security Testing Disclaimer

Defender IT Consulting provides authorized cybersecurity assessment services to our contracted clients. Any security testing, penetration testing, or vulnerability scanning activities are conducted only with proper written authorization under formal service agreements. Unauthorized security testing against our infrastructure or any third-party systems is strictly prohibited.

4. Compliance with Laws

Users must comply with all applicable laws and regulations, including but not limited to: Computer Fraud and Abuse Act (CFAA), General Data Protection Regulation (GDPR) where applicable, California Consumer Privacy Act (CCPA) where applicable, Health Insurance Portability and Accountability Act (HIPAA) where applicable, and industry-specific compliance requirements (CMMC, NIST, SOC 2, etc.).

5. Reporting Violations

If you become aware of any violations of this Acceptable Use Policy, please report them immediately to security@defenderit.consulting. We take all reports seriously and will investigate accordingly.

6. Consequences of Violation

Violations of this policy may result in: Immediate termination of access to our website and services, cancellation of service agreements without refund, reporting to appropriate law enforcement authorities, and civil or criminal legal action as appropriate.

7. Modifications

Defender IT Consulting reserves the right to modify this Acceptable Use Policy at any time. Changes will be effective upon posting to our website. Continued use of our website or services after changes are posted constitutes acceptance of the modified policy.

8. Contact Information

For questions about this policy, please contact us at: Defender IT Consulting, 784 S. Clearwater Loop #4297, Post Falls, ID 83854, USA. Phone: (864) 207-4273. Email: security@defenderit.consulting.