Acceptable Use Policy (AUP)
Version: 1.0
Effective Date: 20 February 2026
Last Reviewed: 20 February 2026
Part of the Master Service Agreement (MSA) β Incorporated by Reference
π« Prohibited Activities
π Security
π Content Rules
βοΈ Enforcement
π’ Reporting
π‘οΈ Platform Protection
π RELATIONSHIP TO MASTER SERVICE AGREEMENT:
This Acceptable Use Policy ("AUP") is incorporated by reference into the Master Service Agreement (MSA). It applies to all users of Long Haul Technologies systems, platforms, and services, including clients, their employees, contractors, end-users, and any third parties accessing our systems. Capitalized terms used but not defined herein have the meanings given in the MSA.
β οΈ IMPORTANT:
Violation of this Acceptable Use Policy may result in immediate suspension or termination of access to our systems and services, without refund, and may have legal consequences. By using our systems, you agree to comply with this policy.
π PART A: INTRODUCTION AND SCOPE
A.1 Purpose
Long Haul Technologies provides software platforms, systems, and services (collectively, "Systems") to clients and their authorized users. This Acceptable Use Policy is designed to:
- Ensure the security, integrity, and reliability of our Systems;
- Protect the rights and privacy of all users;
- Prevent unlawful, harmful, or inappropriate use;
- Maintain compliance with applicable laws and regulations;
- Safeguard our intellectual property and that of third parties.
A.2 Who This Policy Applies To
This policy applies to all individuals and entities who access or use our Systems, including:
- Clients: Organizations that have contracted with Long Haul Technologies;
- Authorized Users: Employees, contractors, and agents of Clients;
- End-Users: Learners, students, assessors, and other individuals using systems provided to Clients;
- Visitors: Any person accessing publicly available portions of our Systems;
- Third Parties: Any party interacting with our Systems through APIs or integrations.
A.3 Acceptance
By accessing or using any Long Haul Technologies System, you acknowledge that you have read, understood, and agree to comply with this AUP. If you do not agree, you must not access or use our Systems.
π« PART B: PROHIBITED ACTIVITIES
The following activities are strictly prohibited when using Long Haul Technologies Systems:
π Illegal Activities
- Violating any applicable law or regulation;
- Facilitating or encouraging illegal activity;
- Fraud, scams, or deceptive practices;
- Money laundering or terrorist financing;
- Gambling where prohibited by law;
- Unauthorized access to government systems;
- Facilitating illegal downloads or piracy.
π Harmful Content
- Child sexual abuse material (CSAM) or any content exploiting minors;
- Pornography, obscene, or sexually explicit content;
- Content depicting violence, cruelty, or exploitation;
- Hate speech, discrimination, or incitement to violence;
- Harassment, bullying, or threatening material;
- Suicide or self-harm promotion;
- Terrorist or extremist content.
π Security Violations
- Unauthorized access to any System or account;
- Bypassing authentication or security measures;
- Introducing malware, viruses, or harmful code;
- Denial of service (DoS) attacks;
- Port scanning or vulnerability testing without authorization;
- Intercepting or tampering with communications;
- Password cracking or credential stuffing.
π§ Abuse of Systems
- Sending spam, unsolicited bulk messages;
- Phishing or social engineering attempts;
- Email harvesting or address scraping;
- Using Systems to relay mail or messages;
- Generating excessive traffic or resource usage;
- Automated excessive queries (scraping);
- Disrupting other users' access.
π Intellectual Property Violations
- Uploading content that infringes copyrights;
- Using trademarks without authorization;
- Reverse engineering our Systems;
- Decompiling or disassembling software;
- Removing copyright or proprietary notices;
- Circumventing license restrictions;
- Reselling access without authorization.
π Data Privacy Violations
- Collecting personal information without consent;
- Processing sensitive data without authorization;
- Sharing personal information with unauthorized parties;
- Violating POPIA, GDPR, or other privacy laws;
- Storing data in unauthorized locations;
- Failing to protect access credentials;
- Unauthorized monitoring of users.
βοΈ System Interference
- Attempting to crash or overload systems;
- Interfering with other users' sessions;
- Modifying system configuration without authorization;
- Disabling logging or monitoring;
- Uploading files with malicious payloads;
- Exploiting bugs or vulnerabilities;
- Using systems for cryptocurrency mining.
π Educational System Abuse
- Cheating, plagiarism, or academic dishonesty;
- Impersonating another user in assessments;
- Manipulating assessment results;
- Sharing assessment content without authorization;
- Attempting to falsify credentials or certificates;
- Circumventing assessment security measures;
- Unauthorized access to grading systems.
π PART C: CONTENT STANDARDS
All content uploaded, posted, transmitted, or otherwise made available through our Systems must comply with the following standards:
C.1 Lawful Content
Content must not violate any applicable law or regulation, including but not limited to:
- Copyright and intellectual property laws;
- Data protection and privacy laws (POPIA, GDPR);
- Defamation and libel laws;
- Anti-discrimination and hate speech laws;
- Consumer protection laws;
- Export control and sanctions laws.
C.2 Educational Content
For educational content uploaded to LMS, LMIS, or assessment platforms:
- Content must be appropriate for the intended audience;
- Course materials must not contain harmful or misleading information;
- Assessments must fairly evaluate learner knowledge;
- Accreditation claims must be accurate and substantiated;
- Content must not plagiarize or infringe third-party rights.
C.3 Prohibited Content Examples
Without limiting the generality of Part B, the following content types are specifically prohibited:
- Illegal: Content promoting or facilitating illegal activities;
- Harmful: Content that could cause physical or financial harm;
- Deceptive: Fraudulent, misleading, or deceptive content;
- Malicious: Content containing malware or malicious code;
- Harassing: Content that harasses, bullies, or threatens;
- Discriminatory: Content promoting discrimination based on race, gender, religion, etc.;
- Explicit: Pornographic or excessively violent content;
- Confidential: Unauthorized disclosure of confidential information.
π PART D: SECURITY OBLIGATIONS
D.1 Account Security
- You are responsible for maintaining the security of your account credentials;
- Passwords must be strong and not shared with unauthorized individuals;
- You must notify us immediately of any unauthorized access or use;
- Multi-factor authentication must be used where available;
- You are responsible for all activities occurring under your account.
D.2 System Access
- Access is permitted only through authorized interfaces;
- Automated access (scraping, bots) is prohibited without written permission;
- You may not circumvent access controls or rate limits;
- Access is for authorized purposes only;
- You may not share access with unauthorized third parties.
D.3 Data Security
- You must implement reasonable security measures for data you store;
- Sensitive data must be encrypted in transit and at rest;
- You must promptly patch vulnerabilities in your own systems;
- Security incidents affecting our Systems must be reported immediately;
- You must comply with all data protection laws applicable to your data.
D.4 Vulnerability Reporting
If you discover a security vulnerability in our Systems:
- Report it immediately to security@longhaultech.com;
- Do not exploit the vulnerability further;
- Do not disclose the vulnerability publicly until we have addressed it;
- Provide reasonable time for remediation before any disclosure;
- Cooperate in good faith to resolve the issue.
π RESPONSIBLE DISCLOSURE:
We appreciate responsible security research. We will not take legal action against good-faith security researchers who report vulnerabilities in accordance with this policy.
βοΈ PART E: ENFORCEMENT AND CONSEQUENCES
E.1 Monitoring and Investigation
We reserve the right to monitor use of our Systems to ensure compliance with this AUP. This may include:
- Reviewing logs and access records;
- Investigating reported violations;
- Analyzing usage patterns for abuse;
- Scanning for malicious content or code;
- Cooperating with law enforcement investigations.
E.2 Reporting Violations
If you become aware of any violation of this AUP, you must report it immediately to abuse@longhaultech.com. Reports should include:
- Description of the violation;
- Location (URL, system, user) where violation occurred;
- Date and time of the violation;
- Any evidence or documentation;
- Your contact information.
E.3 Enforcement Actions
Violations of this AUP may result in any of the following actions, at our sole discretion:
β οΈ Warning
For minor or first-time violations, we may issue a warning requiring corrective action.
βΈοΈ Suspension
Temporary suspension of access pending investigation or corrective action.
π« Termination
Permanent termination of access, without refund of prepaid fees.
ποΈ Content Removal
Removal of prohibited content without notice.
π° Legal Action
Referral to law enforcement and pursuit of civil remedies.
π Account Restriction
Limiting account privileges or functionality.
E.4 Suspension and Termination
We may suspend or terminate access immediately, without notice, for:
- Serious violations of this AUP (e.g., security breaches, illegal content);
- Repeat violations after warnings;
- Actions that pose immediate risk to our Systems or other users;
- Compliance with legal requirements or law enforcement requests.
β οΈ NO REFUND:
Termination for AUP violations does not entitle you to any refund of prepaid fees. All amounts paid are non-refundable as provided in the Payment Terms.
E.5 Cooperation with Authorities
We reserve the right to cooperate fully with law enforcement authorities and court orders requesting or requiring disclosure of information regarding users suspected of violating this AUP or applicable law. We may disclose user information as required by law.
π€ PART F: USER RESPONSIBILITIES
F.1 Client Responsibilities
Clients are responsible for:
- Ensuring their users comply with this AUP;
- Taking prompt action to address violations by their users;
- Implementing appropriate access controls and user management;
- Providing clear guidance to their users on acceptable use;
- Notifying us of any suspected violations by their users;
- Maintaining accurate records of user accounts and activities.
F.2 End-User Responsibilities
End-users are responsible for:
- Using Systems only for authorized purposes;
- Complying with all applicable laws and policies;
- Respecting the rights of other users;
- Protecting their access credentials;
- Reporting any suspected security issues or violations.
F.3 Reporting Obligations
Clients must promptly report to us any:
- Known or suspected AUP violations by their users;
- Security incidents affecting our Systems;
- Data breaches involving data stored on our Systems;
- Legal requests or orders related to our Systems;
- Complaints from third parties about their use of our Systems.
π’ PART G: REPORTING VIOLATIONS
How to Report a Violation
If you believe someone is violating this Acceptable Use Policy, or if you have concerns about content on our Systems, please report it immediately:
Please include: Description of violation, location (URL/system/user), date/time, and any supporting evidence. We treat all reports confidentially.
G.1 Response to Reports
Upon receiving a report, we will:
- Acknowledge receipt within two (2) business days;
- Investigate promptly and thoroughly;
- Take appropriate action based on our investigation;
- Notify the reporting party of our action where appropriate;
- Maintain records of reports and actions taken.
G.2 Good Faith Reports
We encourage good-faith reporting of suspected violations. Reporting parties acting in good faith will not be subject to retaliation. Knowingly false reports may themselves constitute a violation of this AUP.
π PART H: ADDITIONAL PROVISIONS
H.1 Updates to This Policy
We may update this Acceptable Use Policy from time to time. Updated versions will be posted on our website and will apply to all use of our Systems after the effective date. Material changes will be communicated to clients with reasonable notice.
H.2 Severability
If any provision of this AUP is held invalid or unenforceable, the remaining provisions remain in full force and effect.
H.3 Waiver
Our failure to enforce any provision of this AUP does not constitute a waiver of our right to enforce that or any other provision in the future.
H.4 Interpretation
This AUP shall be interpreted broadly to protect the security, integrity, and reputation of Long Haul Technologies and its Systems. Examples are illustrative, not exhaustive.
π PART I: CONTACT INFORMATION
For questions about this Acceptable Use Policy or to report violations:
Version 1.0 | Effective 20 February 2026 | Last Reviewed 20 February 2026
Long Haul Technologies reserves the right to enforce this Acceptable Use Policy at its sole discretion to protect its Systems, users, and business interests.
BY USING LONG HAUL TECHNOLOGIES SYSTEMS, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO COMPLY WITH THIS ACCEPTABLE USE POLICY.