Acceptable Use Policy
Guidelines for appropriate and responsible use of GCTI platforms, resources, and services.
Last Updated: February 2026
This Acceptable Use Policy ("AUP") outlines the rules and guidelines for using Global Cyber Talent Initiative's ("GCTI", "we", "us") platforms, systems, resources, and services. By accessing or using our services, you agree to comply with this policy.
General Principles
All users of GCTI services are expected to:
- Use resources responsibly and ethically
- Respect the rights and privacy of others
- Comply with all applicable laws and regulations
- Maintain professional standards of conduct
- Report security vulnerabilities responsibly
Permitted Uses
You may use GCTI platforms and resources for:
Programme Activities
Completing assignments, labs, and projects as part of your participation in the GCTI programme.
Learning & Development
Accessing educational materials, resources, and tools provided for your professional development.
Communication
Engaging in professional communication with instructors, mentors, peers, and GCTI staff.
Collaboration
Working collaboratively on authorized team projects and assignments.
Prohibited Activities
The following activities are strictly prohibited:
Unauthorized Access
- Attempting to gain unauthorized access to systems, accounts, or data
- Sharing account credentials or allowing others to use your account
- Bypassing security measures or authentication systems
- Accessing areas of systems beyond your authorized permissions
Malicious Activities
- Introducing malware, viruses, or other harmful code
- Conducting unauthorized security testing or penetration testing
- Attempting to disrupt, damage, or interfere with systems or services
- Engaging in denial-of-service attacks or similar activities
Inappropriate Content
- Posting, sharing, or transmitting offensive, discriminatory, or harassing content
- Sharing confidential or proprietary information without authorization
- Violating intellectual property rights or copyrights
- Spamming, phishing, or engaging in fraudulent activities
Misuse of Resources
- Using resources for purposes unrelated to the programme
- Excessive resource consumption that impacts other users
- Mining cryptocurrency or similar resource-intensive activities
- Hosting unauthorized services or applications
Security Responsibilities
Your Security Obligations
As a participant in a cybersecurity programme, you have additional responsibilities:
- Maintain strong, unique passwords for all accounts
- Keep software and systems updated with security patches
- Report security vulnerabilities through proper channels
- Follow responsible disclosure practices
- Protect sensitive information and data
Lab and Testing Environments
When using GCTI lab environments and testing platforms:
- Only test within designated lab environments
- Do not attempt to access or test systems outside authorized scopes
- Follow all lab guidelines and restrictions
- Report any issues or vulnerabilities discovered during authorized testing
- Do not share lab access credentials or environments with unauthorized parties
Important Note
Unauthorized security testing or hacking activities outside of designated lab environments may result in immediate termination from the programme and potential legal action.
Intellectual Property
All content, materials, and resources provided by GCTI are protected by intellectual property laws. You may:
- Use materials for personal learning and programme participation
- Share materials with other programme participants for collaborative learning
You may not:
- Reproduce, distribute, or publish GCTI materials without authorization
- Use materials for commercial purposes
- Remove copyright notices or attribution
- Create derivative works without permission
Monitoring and Enforcement
GCTI reserves the right to:
- Monitor usage of our platforms and resources
- Investigate suspected violations of this policy
- Suspend or terminate access for policy violations
- Report illegal activities to appropriate authorities
- Take legal action when necessary
Consequences of Violations
Violations of this Acceptable Use Policy may result in:
- Immediate suspension or termination of access
- Removal from the programme
- Legal action and reporting to law enforcement
- Financial liability for damages caused
Reporting Violations
If you become aware of a violation of this policy, please report it immediately:
- Sponsorship and Support: sponsor@globalcybertalent.com
- General Inquiries: enquiries@globalcybertalent.com
- Application Form: applications@globalcybertalent.com
All reports will be investigated promptly and confidentially.
Changes to This Policy
We may update this Acceptable Use Policy from time to time. Continued use of our services after changes constitutes acceptance of the updated policy. We encourage you to review this policy regularly.
Questions?
If you have questions about this Acceptable Use Policy or need clarification on permitted uses, please contact us at enquiries@globalcybertalent.com.