top of page

Privacy Policy

1. Introduction, Scope, and Interpretation

1.1 Purpose of the Policy

This Acceptable Use Policy (the "AUP") establishes mandatory guidelines for the acceptable and permitted use of all proprietary and third-party services, software, infrastructure, and computational resources provided by CyberSapient Technology Solutions Private Limited (referred to as "CyberSapient.io," "we," or "us"). The AUP is an essential legal instrument designed to safeguard the integrity and security of our shared networks, protect our brand reputation, and ensure a reliable, high-quality service environment for all users and clients.

1.2 Applicability and Compliance

This Policy applies universally to all Clients and Users ("you") utilizing any of CyberSapient.io's offerings, including but not limited to technology consulting platforms, custom software hosting, AI deployment environments, cloud resources, and hosted subscriptions (SaaS). By using or accessing our Services, you unconditionally consent to comply with the terms of this AUP. Any breach of this AUP constitutes a material breach of the governing Terms and Conditions of Service and may result in the immediate and irreversible suspension or termination of your Account and Services.

1.3 Relationship to Other Agreements

This AUP is explicitly incorporated by reference into the CyberSapient.io Terms and Conditions of Service and, where applicable, any Master Services Agreement (MSA) or Statement of Work (SOW). In the event of an irreconcilable conflict between this AUP and an SOW, the SOW will prevail only where it explicitly grants a right or permission that would otherwise be restricted by this AUP.

2. Prohibited Illegal and Highly Harmful Uses

The Services may be used only for lawful purposes. Any action involving the transmission, distribution, storage, or execution of material that violates any applicable local, state, national, or international law or regulation is strictly prohibited.

2.1 Illegal Activities and Content

You are expressly prohibited from using our Services to engage in, facilitate, or promote any activity deemed illegal in any applicable jurisdiction. This includes, but is not limited to:

Child Exploitation Material: Any activity related to the hosting, storage, distribution, or transmission of content that constitutes child pornography, child sexual abuse material, or is otherwise harmful to minors.

Financial Fraud: Conducting or facilitating deceptive practices intended to defraud the public, including pyramid schemes, financial scams, identity theft, or deceptive impersonation for monetary gain.

Intellectual Property Infringement: Unauthorized downloading, hosting, storing, transmitting, or distributing of content protected by copyright, trademark, patent, or trade secret law. This includes engaging in software piracy, distributing unauthorized digital media, or hosting file-sharing platforms without explicit, demonstrable legal rights to the content.

Illegal Controlled Substances: Selling, distributing, or promoting illegal drugs, controlled substances, or related paraphernalia.

2.2 Harmful, Abusive, or Harassing Content

You may not use the Services to create, post, transmit, or distribute content that is objectively malicious, abusive, or designed to cause distress or harm. Prohibited content includes:

Hate Speech and Discrimination: Content that promotes, advocates, or facilitates violence, discrimination, or degradation against individuals or groups based on characteristics such as race, ethnicity, religion, gender, age, disability, veteran status, or sexual orientation.

Defamation and Libel: Publishing false, malicious, or defamatory statements intended to injure the reputation or livelihood of any person or entity.

Harassment and Cyberbullying: Any form of stalking, threats, aggressive targeting, persistent digital disruption, or non-consensual sharing of private, intimate images or videos.

Promotion of Violence: Content that explicitly encourages, trains for, or glorifies acts of self-harm, terrorism, or violence against individuals or governments.

3. System and Network Security Abuse

Any deliberate or negligent action that compromises or attempts to compromise the security, integrity, or availability of CyberSapient.io's systems, networks, or data, or those of any Third Party, is a severe violation of this AUP and subject to immediate remedial action.

3.1 Unauthorized Access and Breaches

You must not attempt to gain unauthorized access to any systems, networks, or data not specifically designated for your contracted use. Prohibited access methods include:

Credential Theft: Employing techniques such as brute-forcing, dictionary attacks, or credential stuffing to compromise user accounts or systems.

Session Hijacking: Intercepting or manipulating network traffic to gain control of another user's active session.

Evasion of Controls: Circumventing any security, authentication, password, or access control mechanisms implemented by CyberSapient.io or its partners.

3.2 Security Testing Requirements

You are strictly prohibited from conducting any form of vulnerability scans, penetration testing, performance benchmarks, or security assessments on our Services, underlying infrastructure, or network perimeter without express, prior written permission granted by CyberSapient.io's security team, documented via a formal scope agreement.

3.3 Network and Resource Interference

You must not engage in any activity that interferes with the proper functioning of the Services or consumes a disproportionate amount of shared resources, thereby disrupting the experience of other users. Prohibited activities include:

Denial of Service (DoS/DDoS): Launching, initiating, or facilitating any attack designed to flood a target resource with excessive requests, preventing legitimate access to Services.

Resource Misuse: Operating high-load, non-standard processes such as cryptocurrency mining, extensive database scraping (beyond the contracted service limits), or running continuously memory-intensive jobs that exceed the constraints of your service tier.

Tunneling and Proxies: Operating open proxy servers, open relays, or other network tunneling technologies that facilitate unauthorized or prohibited activities.

3.4 Malicious Software Distribution

You must not introduce, transmit, or execute viruses, Trojan horses, ransomware, spyware, worms, time bombs, or any other destructive or contaminating program or code designed to interfere with, intercept, disrupt, or expropriate any system, data, or personal information.

 

4. Email, Messaging, and Spam Restrictions

The Services, including any email or messaging functionality provided, must be used in strict adherence to anti-spam laws and best practices.

 

4.1 Unsolicited Bulk Communications (Spam)

The transmission of any email or electronic message to recipients who have not specifically and verifiably consented to receive such messages (Unsolicited Commercial Email or UCE) is prohibited. This includes, but is not limited to:

Consent Verification: You must maintain verifiable proof of opt-in consent for every recipient on your mailing list.

Header Manipulation: Falsifying, forging, or omitting email headers, IP addresses, or any other protocol identifiers to disguise the true origin of messages.

Mass Communication Abuse: Sending large volumes of emails that bounce due to invalid addresses, which negatively impacts our reputation and shared IP sender scores.

4.2 Deceptive Messaging and Phishing

You may not use the Services to engage in any form of fraudulent or deceptive messaging practices:

Phishing: Creating or disseminating messages intended to trick recipients into revealing sensitive personal, financial, or authentication information (passwords, credit card numbers).

Misrepresentation: Falsely representing yourself, your organization, or the product or service being promoted, including misstating the sender's contact information.

5. Content Standards for AI and Data Services

When leveraging CyberSapient.io's platforms for data processing, AI model deployment, or generative services, you must comply with these specialized content and data standards.

5.1 Data Rights and Compliance

You are solely responsible for the legality, accuracy, and integrity of all Data submitted to our Services. You warrant and represent that:

You possess all necessary licenses, permissions, and rights to collect, process, and input the Data.

The use and processing of the Data comply with all applicable data privacy laws, including the protection of Personal Data and any requirements specific to regulated industries (e.g., healthcare, finance).

5.2 Misuse of Generative AI Models

You must not utilize any AI model or generative service provided or hosted by CyberSapient.io to:

Generate Malicious Artifacts: Create, debug, or distribute computer code, zero-day exploits, or chemical/biological schematics designed to harm, disrupt, or compromise any system or individual.

Disinformation Campaigns: Generate false, misleading, or deceptive content (text, audio, or visual) intended to manipulate public opinion, influence elections, or spread harmful misinformation.

Deceptive Media (Deepfakes): Create or distribute synthetically generated audio, video, or images that realistically impersonate identifiable individuals without their express, written, and revocable consent, particularly for fraudulent or abusive purposes.

Circumvention of Ethical Filters: Intentionally craft inputs or prompts designed to elicit responses or content that bypass the model's integrated safety and ethical guidelines.

5.3 High-Risk Operational Use

The Services are provided for general business and technological applications. You acknowledge that the Services are not designed, intended, or certified for use in high-risk or critical infrastructure environments requiring fault-tolerant performance, including: life support systems, nuclear facilities operation, air traffic control, emergency response systems, or patient monitoring systems. Any use of the Services in such high-risk activities is strictly prohibited and constitutes a material violation of this AUP.

6. Enforcement and Policy Violations

6.1 Reporting Violations

If you become aware of any potential violation of this AUP, you must immediately report the activity, including all available identifying details and evidence, to us at legal@YourDomain.io.

6.2 Investigation Process

CyberSapient.io reserves the right, at its sole discretion and without prior notice, to fully investigate any suspected violation of this AUP. During an investigation, we may:

Temporarily suspend the Services or restrict access to specific features to prevent ongoing harm.

Preserve any data or logs deemed necessary for the investigation.

Cooperate with governmental, regulatory, and law enforcement agencies in the investigation of suspected crimes or civil wrongdoing.

 

6.3 Penalties and Remedies

Upon determining, at its sole and absolute discretion, that a violation of this AUP has occurred, CyberSapient.io may take immediate remedial action, including, but not limited to:

Issuing a formal written warning and requiring a plan for immediate remediation.

Removing, deleting, or disabling access to the prohibited content or data.

Immediately suspending the Client’s or User’s Account and access to the Services.

Terminating the Account and any associated agreements without any refund of prepaid fees.

Initiating civil proceedings or reporting the violation to the appropriate law enforcement authorities.

6.4 Client Responsibility and Liability

The Client is fully responsible and liable for all activities conducted under their Account, including the actions of their employees, contractors, agents, and end-users who access the Services using the Client's credentials. The Client agrees to indemnify and hold CyberSapient.io harmless against any damages, costs, or claims arising from their users' violation of this AUP.

bottom of page