top of page

ACCEPTABLE USE POLICY

Objectives

The document outlines an Acceptable Use Policy (AUP) for users of the KYCTech and Regulat.io platforms. Its objectives include:

  • Ensuring responsible and ethical use of the platforms by all users, including employees, contractors, and clients.

  • Protecting the platforms from unauthorized access, data breaches, and cyber threats.

  • Providing guidelines for acceptable and unacceptable use of the platforms.

  • Establishing roles and responsibilities for users and the organization (MAQIT) in maintaining security and compliance.

  • Enforcing the policy consistently and applying appropriate sanctions for violations.

  • Offering resources and support to help users understand and comply with the AUP.

 

Definitions

 

Malware

Malicious programs or software are any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans, spyware, adware, root-kits, etc. which steal protected data, delete documents or add software not approved by a user.

 

Pirated Software

Software, which is used, copied, or distributed without respecting ownership or legal rights is considered software piracy, which is illegal.

 

Scope

This Acceptable Use Policy (AUP) applies to all users of the Regulat.io and KYCTech platforms, including employees, contractors, clients, and any other authorized individuals or entities. It encompasses all access and usage of these platforms, whether through company-owned or personal devices, and covers all associated services, applications, and data. The policy aims to ensure that all users engage with Regulat.io and KYCTech responsibly, ethically, and in compliance with applicable laws and organizational standards.

 

Roles and Responsibilities

 

Users

  • Ensure that your use of the platforms complies with this Acceptable Use Policy and all other applicable policies and guidelines.

  • Maintain the confidentiality and security of your account information.

  • Regularly review and comply with updates to this policy, as modifications may occur over time.

 

MAQIT

  • Implement robust security measures to protect the platforms from unauthorized access, data breaches, and other cyber threats.

  • Regularly update and maintain the platforms to address vulnerabilities and improve performance.

  • Monitor platform usage to detect and prevent activities that violate the AUP.

  • Enforce the AUP consistently, applying appropriate sanctions for violations, which may include warnings, account suspension, or termination.

  • Provide resources and support to help users understand the AUP and comply with its guidelines.

  • Offer training or guidance on best practices for secure and responsible platform use.

  • Ensure that user data is handled in accordance with applicable data protection laws and regulations.

  • Maintain transparency about data collection, usage, and sharing practices.

  • Regularly review and update the AUP to reflect changes in technology, legal requirements, and platform functionalities.

  • Communicate any changes to the AUP to users promptly and clearly.

 

Policy

All users of the KYCTech and Regulat.io platforms are required to adhere to the following guidelines to ensure the secure, lawful, and efficient use of our services:

 

Acceptable Use

  • Utilize the platforms solely for their intended business purposes, in alignment with applicable laws and regulations.

  • Safeguard your account credentials; you are responsible for all activities conducted under your account.

  • Promptly report any security vulnerabilities, breaches, or unauthorized access to our support team.

 

Unacceptable Use

The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may need to disable the network access of a host if that host is disrupting production services).

Under no circumstances is an employee of the entity authorized to engage in any activity if illegal under any applicable law while utilizing Company-owned resources.

The lists below are by no means exhaustive but attempt to provide a framework for activities that fall into the category of unacceptable use.

  • Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by the entity.

  • Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books, or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which the entity or the end user does not have an active license.

  • Accessing data, a server, or an account for any purpose other than conducting Company business, even if you have authorized access.

  • Unauthorized exporting of any data, software, technical information, encryption software, or technology.

  • Introduction of malicious programs into the network or server (e.g., viruses, worms, trojan horses, email bombs, malware, etc.).

  • Revealing your account password to others or allowing use of your account by others. This includes family and other household members when work is being done at home.

  • Using an entity’s computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the user's local jurisdiction.

  • Making fraudulent offers of products, items, or services originating from any of the entity’s accounts.

  • Affecting security breaches or disruptions of network communication. Security breaches include but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access unless these duties are within the scope of regular duties. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes.

  • Port scanning or security scanning is expressly prohibited unless prior notification is made to the Information Security Team.

  • Executing any form of network monitoring that will intercept data not intended for the employee's host, unless this activity is a part of the employee's normal job/duty.

  • Circumventing user authentication or security of any host, network, or account.

  • Introducing honeypots, honeynets, or similar technology on the entity’s network.

  • Interfering with or denying service to any user other than the employee's host (for example, denial of service attack).

  • Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user's terminal session, via any means, locally or via the Internet/Intranet/Extranet.

  • Providing information about, or lists of, the entity’s employees to parties outside the entity.

 

Violation

  • Violations of this policy may result in the suspension or termination of your access to the platforms.

  • We reserve the right to remove or disable access to any content that violates this policy.

  • Legal action may be taken against users who engage in prohibited activities, including reporting to law enforcement authorities when necessary.

By using KYCTech and Regulat.io, you agree to comply with this Acceptable Use Policy. If you have any questions or require clarification regarding acceptable use, please contact our support team.

bottom of page