top of page
Greywell Logo White background_edited.jpg

// DOCUMENT: ACCEPTABLE USE POLICY (AUP)

// STATUS: ENFORCED

// VECTOR: ALL INBOUND TRAFFIC

1.0 // OPERATIONAL SCOPE

This Acceptable Use Protocol (AUP) defines the boundaries of interaction with the Greywell Cyber infrastructure. It applies to all users, automated agents, and API connections accessing this domain.

2.0 // PROHIBITED RECONNAISSANCE

Unless you hold a signed Engagement Letter explicitly authorising a security assessment, you are strictly prohibited from executing:

[>] VULNERABILITY SCANNING: Any use of automated tools (e.g., Nessus, Burp Suite, Nmap) against our IP space.

[>] ENUMERATION: Attempting to map internal directories, user accounts, or hidden assets.

[>] FUZZING: Injecting malformed data to trigger system errors or disclose stack traces.

The following actions are classified as hostile and will trigger immediate forensic response:

[>] DENIAL OF SERVICE: Any attempt to saturate network bandwidth or exhaust system resources (DDoS/DoS).

[>] PAYLOAD INJECTION: Attempting Cross-Site Scripting (XSS), SQL Injection, or Remote Code Execution (RCE).

[>] IDENTITY SPOOFING: Manipulating headers to mask origin or impersonating Greywell Cyber staff.

3.0 // HOSTILE VECTORS

4.0 // "BUG BOUNTY" DISCLAIMER

Greywell Cyber DOES NOT operate a public Bug Bounty program.  Do not attempt to probe our defences under the assumption of "Good Samaritan" testing.  Unauthorised penetration testing is a violation of the Computer Misuse Act 1990 (Section 1) and we will prosecute.

5.0 // INTELLECTUAL INTEGRITY & OWNERSHIP

The interactive utilities (Subnet Calculators, Quiz Engines, etc.) and underlying logic hosted on this domain are the exclusive intellectual property of Greywell Cyber Ltd, developed via proprietary internal logic.

[>] NO LICENSE: Nothing in your use of these tools grants you any rights of ownership.

[>] REVERSE ENGINEERING: You may not decompile, analyse, or integrate our tool logic into external corporate intranets or commercial products.

6.0 // ENFORCEMENT & BLACKLISTING

We deploy active threat intelligence monitoring. Violation of this AUP will result in:

[>] Immediate IP-level ban (null-routing).

[>] Report submission to ISP abuse channels.

[>] Legal action for damages where infrastructure integrity is compromised.

// END OF PROTOCOL

bottom of page