CyberITEX Logo
Login

Acceptable Use Policy

Introduction

This Acceptable Use Policy outlines the guidelines and restrictions for using CyberITEX ("we", "us", or "our") services, platforms, and resources. This policy applies to all users of our services, including clients, visitors to our website, and users of our client portal.

As a Managed Security Service Provider (MSSP), we take security and acceptable use very seriously. By using our services, you agree to comply with this policy.

This policy was last updated on March 14, 2025.

Scope of Services

CyberITEX provides a range of IT and security services, including but not limited to:

  • Cybersecurity and security auditing
  • Domain registration and web hosting
  • Web development and marketing services
  • Email services and email security
  • Technical support and system administration
  • Software development and automation
  • VPN solutions and password management

This policy applies to all services provided by CyberITEX.

Prohibited Activities

When using CyberITEX services, you agree NOT to:

  • Engage in any illegal activities or violate any applicable laws or regulations
  • Attempt to gain unauthorized access to any part of our services or any third-party systems
  • Upload, transmit, or distribute any malware, viruses, or other malicious code
  • Interfere with or disrupt the integrity or performance of our services
  • Conduct security testing, vulnerability scanning, or penetration testing without explicit written permission
  • Share your account credentials with unauthorized third parties
  • Use our services to send unsolicited commercial messages (spam)
  • Host, distribute, or transmit content that is illegal, harmful, threatening, abusive, harassing, defamatory, or otherwise objectionable
  • Use our services for any purpose that exceeds reasonable usage limits or places excessive load on our systems
  • Attempt to circumvent any security measures or monitoring systems we have in place

Account Security

Users are responsible for:

  • Maintaining the confidentiality of their account credentials
  • Using strong, unique passwords for their CyberITEX accounts
  • Enabling multi-factor authentication where available
  • Immediately reporting any suspected unauthorized access or security incidents
  • Ensuring that only authorized individuals have access to company accounts

We offer login via email/password or SSO (Single Sign-On) through Google or Microsoft to enhance security. We recommend using SSO when possible for improved security.

Content Guidelines

When using our hosting, web development, or email services, all content must:

  • Comply with all applicable laws and regulations
  • Respect intellectual property rights of others
  • Not contain material that is harmful, offensive, or inappropriate
  • Not mislead or deceive visitors or recipients
  • Not include excessive resource-intensive scripts or applications without prior approval

We reserve the right to remove or disable access to any content that violates these guidelines.

Resource Usage

Our services are designed to provide fair and efficient resource allocation among all clients. To ensure this:

  • Clients must not exceed reasonable usage limits for their service tier
  • Automated scripts and applications must be optimized to minimize server load
  • Bulk operations should be scheduled during off-peak hours when possible
  • File storage should be used for legitimate business purposes only

If we identify excessive resource usage, we will work with you to optimize your usage or recommend an appropriate service upgrade.

Third-Party Services

As authorized partners or resellers for major technology providers including Microsoft, Google, Lenovo, Adobe, Bitwarden, WIX, PAX8, AWS, IONOS, Hetzner, SupportWave, Qualys, and Check Point, we require that:

  • Use of these third-party services through CyberITEX complies with the respective service provider's terms and conditions
  • Licenses and subscriptions are used only for their intended purpose
  • Any issues with third-party services are reported to CyberITEX promptly so we can address them

Security Monitoring and Auditing

To maintain security and ensure compliance with this policy:

  • We monitor our systems and services for suspicious or unauthorized activities
  • We may conduct regular security audits of our infrastructure
  • We log access to critical systems and applications
  • We investigate potential security incidents or policy violations

This monitoring is conducted solely for security purposes and to protect our clients and infrastructure.

Policy Enforcement

In case of violation of this Acceptable Use Policy:

  • We may temporarily suspend or permanently terminate access to our services
  • We may remove or disable access to content that violates this policy
  • We may notify you of the violation and request immediate remediation
  • In serious cases, we may report the violation to appropriate authorities
  • We reserve the right to take any other action we deem necessary to protect our systems, users, and reputation

Note: The severity of our response will be proportional to the severity of the violation.

Changes to This Policy

We may update our Acceptable Use Policy from time to time. We will notify you of any changes by posting the new policy on this page and updating the "last updated" date at the top of this policy.

You are advised to review this policy periodically for any changes. Continued use of our services after changes to this policy constitutes acceptance of the updated policy.

Reporting Violations

If you become aware of any violation of this policy, please report it immediately to our security team:

By email: security@cyberitex.com

By phone: +1 (970) 460-8020

Emergency contact: 24/7 Security Hotline: +1 (970) 460-8021

Contact Us

If you have any questions about our Acceptable Use Policy, please contact us:

By email: info@cyberitex.com

By phone: +1 (970) 460-8020

By mail: CyberITEX, 30 N Gould St SHERIDAN, WY 82801