Acceptable Use Policy
Rules and standards for using Flynaut's website, services, platforms, and any infrastructure or tools provided during professional service engagements.
1. Purpose and Scope
This Acceptable Use Policy (“AUP”) defines the rules and standards for using Flynaut LLC's (“Flynaut”) website (www.flynaut.com), services, platforms, and any infrastructure or tools provided to clients during a professional service engagement. This AUP applies to:
- All visitors to the Flynaut website
- All clients who engage Flynaut for professional services
- All authorized users of Flynaut-managed infrastructure, platforms, or tools
- All employees, contractors, and agents of clients who access Flynaut-managed systems
This AUP supplements (and does not replace) the Terms of Service for website visitors and the Master Services Agreement for clients. In the event of a conflict between this AUP and the MSA, the MSA prevails.
2. General Conduct
Users of Flynaut's website and services agree to:
- Use Flynaut services only for lawful purposes and in accordance with applicable laws and regulations
- Respect the rights and property of Flynaut, its clients, and third parties
- Provide accurate and truthful information when submitting forms or creating accounts
- Maintain the confidentiality of account credentials and access tokens
- Promptly report any suspected security incidents, unauthorized access, or violations of this AUP
3. Prohibited Activities
The following activities are strictly prohibited. This list is not exhaustive; Flynaut reserves the right to determine, in its sole discretion, whether any activity violates this AUP.
3.1 Illegal and Harmful Activities
- Any activity that violates any applicable federal, state, local, or international law or regulation
- Processing, storing, or transmitting data that infringes any intellectual property right or proprietary right
- Transmitting material that is defamatory, obscene, threatening, harassing, or promotes hatred or discrimination
- Facilitating or participating in any form of fraud, money laundering, or terrorist financing
3.2 Security Violations
- Attempting to gain unauthorized access to any system, network, account, or data
- Conducting network scanning, port scanning, or vulnerability testing without prior written authorization
- Distributing or deploying malware, ransomware, viruses, worms, or any other malicious code
- Intercepting or monitoring network traffic not intended for you
- Circumventing any security controls, authentication mechanisms, or access restrictions
- Using Flynaut-managed infrastructure to launch attacks (DDoS, brute force, credential stuffing)
3.3 Resource Abuse
- Mining cryptocurrency using Flynaut-managed infrastructure without prior written authorization
- Running compute-intensive workloads on shared infrastructure without prior authorization
- Using automated tools (bots, scrapers) in a manner that degrades performance for other users
3.4 Communication Abuse
- Sending unsolicited bulk email (spam) through Flynaut-managed email infrastructure
- Sending phishing emails or emails that impersonate Flynaut or its clients
- Using Flynaut services to send messages that violate the CAN-SPAM Act, GDPR, or other anti-spam laws
3.5 Data Protection Violations
- Processing personal data in violation of applicable data protection laws (GDPR, CCPA, HIPAA, PCI DSS) without required safeguards
- Transferring personal data across borders in violation of applicable data transfer restrictions
- Failing to notify Flynaut of a data breach affecting Flynaut-managed systems within the required timeframes
4. Security Obligations for Clients
Clients using Flynaut-managed infrastructure, platforms, or services are responsible for:
- Maintaining the confidentiality of all account credentials, API keys, access tokens, and SSH keys
- Implementing multi-factor authentication (MFA) for all administrative accounts
- Promptly revoking access for employees or contractors who are no longer authorized
- Ensuring all authorized users comply with this AUP
- Applying security patches and updates to client-managed software components
- Reporting any suspected security incident to [email protected] within 24 hours of discovery
5. Compliance Monitoring
Flynaut reserves the right to monitor use of its services for compliance with this AUP. Monitoring activities may include automated scanning for malware and configuration violations, review of system logs, and network traffic analysis for security purposes. Monitoring is conducted solely for security and compliance purposes.
6. Enforcement
6.1 Graduated Response
- Written warning: For first-time, minor, or inadvertent violations
- Temporary suspension: For repeated violations or immediate risk
- Permanent termination: For severe violations, illegal activity, or repeated violations after prior warnings
- Legal action: For violations that cause damage to Flynaut, its clients, or third parties
- Law enforcement reporting: Violations involving illegal activity
6.2 Emergency Action
Flynaut may take immediate action without prior notice if a violation poses an imminent threat to security, integrity, or availability. Flynaut will notify the affected user as soon as practicable.
7. Reporting Violations
- Security incidents: [email protected]
- General AUP violations: [email protected]
- Abuse reports (spam, phishing): [email protected]
8. Changes to This Policy
Flynaut may update this AUP from time to time. We will notify affected users of material changes at least 30 days before the changes take effect.
9. Contact
Flynaut LLC
Attn: Legal Department
Michigan, United States
Email: [email protected]
Security: [email protected]
Abuse: [email protected]