Privacy Policy
Cookies Policy
Acceptable Use Policy
Job & Money Back Guarantee – T&Cs

CyLynk Acceptable Use Policy

This policy is effective as of 29th July 2024. Please note that this AUP may be updated from time to time.

LAST UPDATED 6TH AUGUST 2025

1. Scope and Application

1.1 Coverage

This AUP applies to all users, including students, mentors, instructors, administrators, and visitors accessing CyLynk services via web, mobile, or API. It includes use of virtual labs, participation in courses and forums, and communications through CyLynk channels.

1.2 User Categories

Describes the roles covered: Students/Learners, Mentors/Instructors, Contributors, Administrators, and Visitors.

1.3 Binding Agreement

This AUP forms part of your agreement with CyLynk and must be read with the Terms of Service, Privacy Policy, and specific program agreements.

2. Permitted Uses

2.1 Educational Activities

Participation in courses, accessing content, completing assignments, and engaging in labs.

Respectful communication, group collaboration, and constructive feedback.

Professional development including networking, mentorship, and events.

2.2 Research and Innovation

Security research in approved labs, tool development, participation in authorized programs.

2.3 Platform Interaction

Profile creation, downloading learning materials, providing feedback for improvement.

3. Prohibited Activities

3.1 Security Violations

Unauthorized access, exploitation, or circumvention of security systems.

Malicious activities like malware, DDoS, or unauthorized scanning.

Unapproved security testing or ethical hacking.

3.2 Platform Misuse

Sharing credentials, impersonation, resource abuse, unauthorized resale.

Technical manipulation or reverse engineering.

3.3 Content and Communication Violations

Harassment, hate speech, inappropriate content, discrimination.

Spam, doxxing, or defamatory behavior.

3.4 Intellectual Property and Legal Violations

Copyright infringement, legal violations, or unethical use.

4. User Responsibilities and Obligations

4.1 Account Security

Protect credentials, report incidents, use MFA.

4.2 Accurate Information

Provide truthful data, verify identity, ensure assignment authenticity.

4.3 Respectful Engagement

Maintain professionalism, inclusivity, and resolve conflict respectfully.

4.4 Compliance and Continuous Learning

Stay updated, comply with laws, uphold ethical standards.

5. Monitoring, Investigation, and Enforcement

5.1 Monitoring Capabilities

Automated and manual reviews for policy compliance and performance tracking.

5.2 Investigation Process

Step-by-step investigation including user communication and evidence review.

5.3 Enforcement Actions

Warnings, feature restrictions, account termination, and legal reporting.

5.4 Appeal Process

Users may appeal enforcement actions with supporting evidence.

6. Reporting Violations and Concerns

6.1 Reporting Mechanisms

Contact: security@cylynk.com, support portal, or emergency line 1300 CYLYNK.

6.2 Information to Include

Details, screenshots, contact (optional).

6.3 Protection for Reporters

Non-retaliation, confidentiality, and investigative support.

7. Special Considerations for Cybersecurity Education

7.1 Ethical Hacking and Penetration Testing

Must occur in designated labs with written permission and compliance.

7.2 Use of Security Tools

Only in approved labs with proper documentation and data protection.

7.3 Industry Networking and Collaboration

Maintain professional standards, confidentiality, and responsible knowledge sharing.