KYA Consulting
Home Services About Contact Client Portal

Acceptable Use Policy

Last Updated: January 1, 2026

This Acceptable Use Policy outlines the operational boundaries and security expectations for all clients interacting with infrastructure, endpoints, and managed environments governed by KYA Consulting. Our focus is on maintaining absolute systemic integrity.

1. Prohibited Actions

Users operating within environments managed or monitored by KYA Consulting are strictly prohibited from engaging in the following activities:

  • Attempting to bypass, disable, or subvert implemented security controls, endpoint management agents, or data loss prevention protocols.
  • Utilizing managed hardware or networks to engage in unauthorized data acquisition, penetration testing, or network exploitation without explicit prior authorization.
  • Using infrastructure to distribute malicious software, unapproved shadow IT applications, or content that violates local, federal, or international regulatory compliance standards.
  • Introducing unauthorized or unvetted private devices into locked-down corporate network environments.

2. Compliance and Auditing

To ensure environments remain secure and performant, KYA Consulting leverages automated tools to verify adherence to configuration baselines. Actions that intentionally disrupt these monitoring capabilities are considered a violation of this policy.

3. Client Responsibilities

While KYA Consulting manages the technical implementation, client organizations are responsible for ensuring their personnel utilize the provided infrastructure in accordance with the organization's own internal corporate governance and IT directives.

4. Enforcement

In scenarios where a severe policy violation presents an immediate threat to the environment's integrity or stability, KYA Consulting reserves the right to isolate compromised endpoints, sever network access, or initiate emergency containment protocols until the situation is resolved.

KYA Consulting

Enterprise-grade endpoint and infrastructure management.

Navigation

  • Home
  • Services
  • About
  • Contact

Client Access

  • Secure Portal Login
  • System Status
  • Knowledge Base
© 2026 KYA Consulting. All rights reserved.
Privacy Policy Acceptable Use Policy Terms of Service

Client Portal

Please log in to manage your infrastructure services.

Authentication failed. Please check your credentials or contact support if the issue persists.