Legal

Acceptable Use Policy

Guidelines for appropriate and responsible use of GCTI platforms, resources, and services.

Last Updated: February 2026

This Acceptable Use Policy ("AUP") outlines the rules and guidelines for using Global Cyber Talent Initiative's ("GCTI", "we", "us") platforms, systems, resources, and services. By accessing or using our services, you agree to comply with this policy.

General Principles

All users of GCTI services are expected to:

  • Use resources responsibly and ethically
  • Respect the rights and privacy of others
  • Comply with all applicable laws and regulations
  • Maintain professional standards of conduct
  • Report security vulnerabilities responsibly

Permitted Uses

You may use GCTI platforms and resources for:

Programme Activities

Completing assignments, labs, and projects as part of your participation in the GCTI programme.

Learning & Development

Accessing educational materials, resources, and tools provided for your professional development.

Communication

Engaging in professional communication with instructors, mentors, peers, and GCTI staff.

Collaboration

Working collaboratively on authorized team projects and assignments.


Prohibited Activities

The following activities are strictly prohibited:

Unauthorized Access

  • Attempting to gain unauthorized access to systems, accounts, or data
  • Sharing account credentials or allowing others to use your account
  • Bypassing security measures or authentication systems
  • Accessing areas of systems beyond your authorized permissions

Malicious Activities

  • Introducing malware, viruses, or other harmful code
  • Conducting unauthorized security testing or penetration testing
  • Attempting to disrupt, damage, or interfere with systems or services
  • Engaging in denial-of-service attacks or similar activities

Inappropriate Content

  • Posting, sharing, or transmitting offensive, discriminatory, or harassing content
  • Sharing confidential or proprietary information without authorization
  • Violating intellectual property rights or copyrights
  • Spamming, phishing, or engaging in fraudulent activities

Misuse of Resources

  • Using resources for purposes unrelated to the programme
  • Excessive resource consumption that impacts other users
  • Mining cryptocurrency or similar resource-intensive activities
  • Hosting unauthorized services or applications

Security Responsibilities

Your Security Obligations

As a participant in a cybersecurity programme, you have additional responsibilities:

  • Maintain strong, unique passwords for all accounts
  • Keep software and systems updated with security patches
  • Report security vulnerabilities through proper channels
  • Follow responsible disclosure practices
  • Protect sensitive information and data

Lab and Testing Environments

When using GCTI lab environments and testing platforms:

  • Only test within designated lab environments
  • Do not attempt to access or test systems outside authorized scopes
  • Follow all lab guidelines and restrictions
  • Report any issues or vulnerabilities discovered during authorized testing
  • Do not share lab access credentials or environments with unauthorized parties

Important Note

Unauthorized security testing or hacking activities outside of designated lab environments may result in immediate termination from the programme and potential legal action.


Intellectual Property

All content, materials, and resources provided by GCTI are protected by intellectual property laws. You may:

  • Use materials for personal learning and programme participation
  • Share materials with other programme participants for collaborative learning

You may not:

  • Reproduce, distribute, or publish GCTI materials without authorization
  • Use materials for commercial purposes
  • Remove copyright notices or attribution
  • Create derivative works without permission

Monitoring and Enforcement

GCTI reserves the right to:

  • Monitor usage of our platforms and resources
  • Investigate suspected violations of this policy
  • Suspend or terminate access for policy violations
  • Report illegal activities to appropriate authorities
  • Take legal action when necessary

Consequences of Violations

Violations of this Acceptable Use Policy may result in:

  • Immediate suspension or termination of access
  • Removal from the programme
  • Legal action and reporting to law enforcement
  • Financial liability for damages caused

Reporting Violations

If you become aware of a violation of this policy, please report it immediately:

  • Sponsorship and Support: sponsor@globalcybertalent.com
  • General Inquiries: enquiries@globalcybertalent.com
  • Application Form: applications@globalcybertalent.com

All reports will be investigated promptly and confidentially.


Changes to This Policy

We may update this Acceptable Use Policy from time to time. Continued use of our services after changes constitutes acceptance of the updated policy. We encourage you to review this policy regularly.

Questions?

If you have questions about this Acceptable Use Policy or need clarification on permitted uses, please contact us at enquiries@globalcybertalent.com.