This Acceptable Use Policy (AUP) explains what activities are prohibited when using Mo Tech Security’s services,
networks, or products. It applies to all users, customers, partners, contractors, and visitors. By using our services
you agree to comply with this policy.
Prohibited activities
The following activities are strictly prohibited when using Mo Tech Security services or infrastructure:
- Illegal activity: Any activity that violates local, national, or international law or regulation.
- Malicious software: Creating, distributing, or executing malware, ransomware, viruses, worms, trojans, or similar code.
- Spam & unsolicited messaging: Sending bulk unsolicited emails, SMS, or other communications or operating open relays to facilitate spam.
- Phishing & social engineering: Impersonation, credential harvesting, or other actions intended to trick people into revealing sensitive information.
- Denial-of-service: Launching DDoS attacks, flooding, or other actions designed to degrade or interrupt services or third-party systems.
- Unauthorized access: Scanning, probing, exploiting, or attempting to gain unauthorized access to systems, accounts, networks, or data that you do not own or control.
- Abuse of resources: Using resources in a way that harms service availability or performance for other customers (e.g., crypto-mining, uncontrolled mass scans).
- Intellectual property violations: Distributing content that infringes copyrights, trademarks, or other IP rights without authorization.
Security & vulnerability reporting
We expect customers and users to maintain reasonable security hygiene. In particular:
- Maintain secure systems: Keep software and firmware patched, use strong authentication, and follow secure configuration practices.
- Report vulnerabilities: If you discover a security vulnerability in our services or systems, report it promptly to support@motechsecurity.com. Do not exploit or publicize the vulnerability before we have a chance to remediate.
- Cooperate with investigations: Provide reasonable assistance during incident investigations and remediation when necessary.
Acceptable use examples
The following are examples of acceptable activities when using Mo Tech Security services:
- Running legitimate business applications and workloads that you own or are authorized to run.
- Conducting authorized security testing where you have explicit permission from the asset owner and where such testing does not violate law or third-party policies.
- Using our training labs and course materials for learning and skill development in accordance with the course rules.
Intellectual property
- Respect others' IP: Do not use our services to store, distribute, or make available copyrighted or trademarked materials unless you have the right to do so.
- Protect our IP: Do not copy, reproduce, or distribute Mo Tech Security trademarks, copyrighted content, or proprietary materials without permission.
Consequences of misuse
If you violate this AUP or otherwise misuse our services, we may take one or more of the following actions:
- Throttle, suspend, or terminate service access for the offending account or resource.
- Remove or block content that violates this policy.
- Notify affected parties and cooperate with law enforcement or regulatory requests when required.
- Pursue legal action to recover damages or enforce our rights.
We aim to apply corrective actions proportionally and will attempt to notify account holders before taking disruptive measures,
except when immediate action is required to protect people, data, or infrastructure.
Investigation procedures
When we detect potential misuse or receive a complaint, we will generally:
- Collect relevant logs and evidence.
- Contact the account holder to request information or remediation steps.
- Take emergency measures where necessary to stop ongoing abuse.
Reporting abuse
If you need to report abuse, security incidents, or policy violations, please contact us with as much detail as possible (timestamps, IP addresses, logs, and description):
Policy changes
We may update this Acceptable Use Policy from time to time. Material changes will be posted on this page with an updated \"Last updated\" date. Continued use of our services after changes indicates acceptance of the revised policy.
Contact
If you have questions about this Acceptable Use Policy, please contact us:
Thank you for helping keep Mo Tech Security and the internet safer by using our services responsibly.