Last Updated: January 1, 2026
This Acceptable Use Policy outlines the operational boundaries and security expectations for all clients interacting with infrastructure, endpoints, and managed environments governed by KYA Consulting. Our focus is on maintaining absolute systemic integrity.
Users operating within environments managed or monitored by KYA Consulting are strictly prohibited from engaging in the following activities:
To ensure environments remain secure and performant, KYA Consulting leverages automated tools to verify adherence to configuration baselines. Actions that intentionally disrupt these monitoring capabilities are considered a violation of this policy.
While KYA Consulting manages the technical implementation, client organizations are responsible for ensuring their personnel utilize the provided infrastructure in accordance with the organization's own internal corporate governance and IT directives.
In scenarios where a severe policy violation presents an immediate threat to the environment's integrity or stability, KYA Consulting reserves the right to isolate compromised endpoints, sever network access, or initiate emergency containment protocols until the situation is resolved.