Effective Date: May 19, 2026
1. Purpose
This Acceptable Use Policy (“AUP”) governs the use of Cadents products, services, software, platforms, APIs, websites, and related offerings (collectively, the “Services”) by customers, authorized users, partners, and any person accessing the Services (“Users”).
Cadents provides infrastructure lifecycle risk management and related analytics designed to help organizations identify, assess, and manage operational and security risks associated with IT infrastructure assets. This AUP is intended to protect Cadents, its customers, partners, and the broader internet ecosystem from unlawful, abusive, insecure, or disruptive activities.
By using the Services, Users agree to comply with this AUP.
2. General Principles
Users may only use the Services:
- For lawful business purposes
- In accordance with applicable laws and regulations
- In a manner that does not harm Cadents, other customers, or third parties
- In a manner consistent with industry-standard cybersecurity and ethical practices
Users are responsible for all activity occurring under their accounts, including activity by employees, contractors, agents, and third-party users.
3. Prohibited Activities
Users may not use the Services to engage in, facilitate, support, or enable unlawful, abusive, insecure, or disruptive activities.
3.1 Illegal Activity
- Violating any applicable law, regulation, or governmental order
- Export control or sanctions violations
- Fraudulent, deceptive, or misleading conduct
- Theft or unauthorized access to systems, networks, or data
- Intellectual property infringement
3.2 Unauthorized Access or Security Violations
- Attempting to gain unauthorized access to any system, network, account, or data
- Circumventing authentication or security controls
- Probing, scanning, or testing vulnerabilities without authorization
- Introducing malware, ransomware, spyware, viruses, worms, or malicious code
- Conducting denial-of-service attacks or similar disruptive activities
Cadents Services are intended to support defensive cybersecurity and operational lifecycle management activities only.
3.3 Abuse of Monitoring or Discovery Capabilities
- Monitoring systems without authorization
- Collecting or harvesting unrelated data
- Conducting unauthorized reconnaissance or surveillance
- Accessing third-party environments without permission
Users are responsible for ensuring they possess appropriate authorization for all monitored environments.
3.4 Harmful or Disruptive Use
- Overloading or impairing the Services
- Attempting to reverse engineer or disrupt platform operations
- Interfering with another customer’s use of the Services
- Using automation in a manner that creates excessive load or instability
- Misrepresenting identity, affiliation, or authorization
3.5 Sensitive or Restricted Data
Unless expressly authorized in writing by Cadents, Users shall not upload, transmit, or process:
- Classified government information
- Export-controlled information
- Payment card data requiring PCI DSS processing controls
- Protected health information regulated by HIPAA
- Personal data prohibited by applicable privacy laws or customer agreements
4. Security Responsibilities
Users are responsible for:
- Maintaining appropriate safeguards
- Protecting credentials and authentication mechanisms
- Promptly notifying Cadents of suspected unauthorized access or security incidents
- Using supported and secure configurations
- Maintaining lawful authority over monitored infrastructure assets
Cadents reserves the right to suspend access where customer activity presents a material security risk.
5. AI and Automated Decision-Making
Where Cadents provides automated analysis, recommendations, prioritization, or AI-assisted functionality:
- Outputs are intended to support, not replace, professional judgment
- Users remain responsible for operational and compliance decisions
- Users should independently validate critical decisions
6. Third-Party Integrations
If Users connect third-party systems, APIs, or services to Cadents:
- Users must comply with applicable third-party terms
- Users represent they are authorized to grant access
- Cadents is not responsible for third-party availability, accuracy, or security
7. Investigation and Enforcement
Cadents reserves the right to investigate suspected violations of this AUP and may:
- Suspend or restrict access
- Remove content or integrations
- Require remediation actions
- Report unlawful activity to authorities
- Terminate accounts for repeated or material violations
8. Reporting Violations
Users should promptly report suspected violations, abuse, or security concerns to:
Security Contact: security@cadents.com
General Contact: legal@cadents.com
9. Changes to This Policy
Cadents may update this AUP from time to time. Continued use of the Services following publication of an updated version constitutes acceptance of the revised policy.
10. Questions
Questions regarding this Acceptable Use Policy may be directed to:
Cadents Legal & Compliance
legal@cadents.com