1. Scope and Application
1.1 Coverage
This AUP applies to all users, including students, mentors, instructors, administrators, and visitors accessing CyLynk services via web, mobile, or API. It includes use of virtual labs, participation in courses and forums, and communications through CyLynk channels.
1.2 User Categories
Describes the roles covered: Students/Learners, Mentors/Instructors, Contributors, Administrators, and Visitors.
1.3 Binding Agreement
This AUP forms part of your agreement with CyLynk and must be read with the Terms of Service, Privacy Policy, and specific program agreements.
2. Permitted Uses
2.1 Educational Activities
Participation in courses, accessing content, completing assignments, and engaging in labs.
Respectful communication, group collaboration, and constructive feedback.
Professional development including networking, mentorship, and events.
2.2 Research and Innovation
Security research in approved labs, tool development, participation in authorized programs.
2.3 Platform Interaction
Profile creation, downloading learning materials, providing feedback for improvement.
3. Prohibited Activities
3.1 Security Violations
Unauthorized access, exploitation, or circumvention of security systems.
Malicious activities like malware, DDoS, or unauthorized scanning.
Unapproved security testing or ethical hacking.
3.2 Platform Misuse
Sharing credentials, impersonation, resource abuse, unauthorized resale.
Technical manipulation or reverse engineering.
3.3 Content and Communication Violations
Harassment, hate speech, inappropriate content, discrimination.
Spam, doxxing, or defamatory behavior.
3.4 Intellectual Property and Legal Violations
Copyright infringement, legal violations, or unethical use.
4. User Responsibilities and Obligations
4.1 Account Security
Protect credentials, report incidents, use MFA.
4.2 Accurate Information
Provide truthful data, verify identity, ensure assignment authenticity.
4.3 Respectful Engagement
Maintain professionalism, inclusivity, and resolve conflict respectfully.
4.4 Compliance and Continuous Learning
Stay updated, comply with laws, uphold ethical standards.
5. Monitoring, Investigation, and Enforcement
5.1 Monitoring Capabilities
Automated and manual reviews for policy compliance and performance tracking.
5.2 Investigation Process
Step-by-step investigation including user communication and evidence review.
5.3 Enforcement Actions
Warnings, feature restrictions, account termination, and legal reporting.
5.4 Appeal Process
Users may appeal enforcement actions with supporting evidence.
6. Reporting Violations and Concerns
6.1 Reporting Mechanisms
Contact: security@cylynk.com, support portal, or emergency line 1300 CYLYNK.
6.2 Information to Include
Details, screenshots, contact (optional).
6.3 Protection for Reporters
Non-retaliation, confidentiality, and investigative support.
7. Special Considerations for Cybersecurity Education
7.1 Ethical Hacking and Penetration Testing
Must occur in designated labs with written permission and compliance.
7.2 Use of Security Tools
Only in approved labs with proper documentation and data protection.
7.3 Industry Networking and Collaboration
Maintain professional standards, confidentiality, and responsible knowledge sharing.