Elka Technology Group
  • Home
  • About
  • Services
  • Industries
  • Careers
  • Contact
Home / Acceptable Use Policy

Acceptable Use Policy

Standards of conduct for the use of Elka Technology Group services and platforms.

Effective Date: 1 January 2026

1. Introduction and Scope

This Acceptable Use Policy ("Policy") sets forth the rules, guidelines, and standards of conduct that govern the use of all services, platforms, systems, networks, websites, applications, software products, and related infrastructure (collectively, the "Services") provided by Elka Technology Group ("Elka", "the Company", "we", "us", or "our"), including its subsidiaries, affiliated entities, and any brands or products operated under the Elka Technology Group umbrella (collectively, "Elka Entities"). This Policy applies to all users of the Services, including but not limited to clients, contractors, partners, vendors, employees, and any individual or entity that accesses or utilises the Services in any capacity (collectively, "Users" or "you").

This Policy forms an integral part of the contractual relationship between the User and Elka Technology Group and should be read in conjunction with the Terms of Service, Privacy Policy, Cookie Policy, and any other applicable agreements or policies published by the Company. In the event of a conflict between this Policy and any other agreement between the User and Elka Technology Group, the terms of that specific agreement shall prevail unless otherwise stated.

By accessing or using any of the Services, the User acknowledges that they have read, understood, and agree to be bound by the terms of this Policy. If the User does not agree with any provision of this Policy, they must discontinue all use of the Services immediately.

Elka Technology Group reserves the right to update, amend, or modify this Policy at any time, with or without prior notice. Continued use of the Services following the publication of any such changes constitutes acceptance of the revised Policy. Users are encouraged to review this Policy periodically to remain informed of applicable requirements.

2. Permitted Use

The Services provided by Elka Technology Group are made available solely for lawful, legitimate, and authorised purposes. Users may access and use the Services subject to the following conditions:

  • The Services shall be used only in a manner consistent with their intended purpose, as described in the applicable service documentation, agreements, or instructions provided by Elka Technology Group.
  • Users shall ensure that all activities conducted through the Services comply with all applicable local, national, and international laws, regulations, ordinances, and industry standards, including but not limited to data protection legislation, anti-spam legislation, telecommunications regulations, export control laws, and intellectual property laws.
  • Users shall use the Services in a professional and responsible manner that does not adversely affect the availability, performance, security, or integrity of the Services for other users or for Elka Technology Group.
  • Users shall maintain the confidentiality and security of any credentials, access tokens, API keys, passwords, or other authentication mechanisms provided by Elka Technology Group for the purpose of accessing the Services. Users are solely responsible for all activities that occur under their accounts or credentials.
  • Users shall provide accurate, current, and complete information when requested by Elka Technology Group in connection with the use of the Services, and shall promptly update such information to maintain its accuracy.
  • Users shall cooperate with Elka Technology Group in any investigation of suspected violations of this Policy, applicable laws, or the rights of any third party.
  • Where the Services are provided to an organisation, the organisation is responsible for ensuring that all of its employees, agents, and representatives are aware of and comply with this Policy.

3. Prohibited Activities

Users are strictly prohibited from engaging in any of the following activities when using the Services. This list is not exhaustive, and Elka Technology Group reserves the right to determine, at its sole discretion, whether any particular activity constitutes a violation of this Policy.

3.1 Spam, Unsolicited Communications, and Bulk Messaging

Users shall not use the Services for the purpose of sending, facilitating, or enabling any form of unsolicited or unauthorised communications. Prohibited activities include, but are not limited to:

  • Sending unsolicited commercial email, promotional messages, advertisements, or marketing materials to individuals or entities that have not provided explicit prior consent to receive such communications.
  • Distributing bulk messages, chain letters, pyramid schemes, or mass communications of any nature through the Services or using infrastructure provided by Elka Technology Group.
  • Harvesting, collecting, or compiling email addresses, contact information, or other personal data from the Services or from third-party sources for the purpose of sending unsolicited communications.
  • Using the Services to operate or support mailing lists, distribution lists, or subscription services that do not comply with applicable anti-spam legislation, including but not limited to the CAN-SPAM Act, the General Data Protection Regulation (GDPR), the Privacy and Electronic Communications Regulations (PECR), and the Australian Spam Act.
  • Forging, falsifying, or manipulating message headers, sender information, return paths, or any identifying data in electronic communications to conceal the origin or nature of such communications.
  • Using the Services to send communications that contain false, misleading, or deceptive subject lines, headers, or content designed to mislead the recipient about the identity of the sender or the purpose of the communication.

3.2 Unauthorised Automation, Scraping, and Data Harvesting

Users shall not employ automated means to access, interact with, or extract data from the Services without the express prior written consent of Elka Technology Group. Prohibited activities include, but are not limited to:

  • Using automated scripts, bots, crawlers, spiders, scrapers, or similar technologies to access, index, download, extract, or otherwise collect any content, data, or information from the Services.
  • Systematically retrieving data or content from the Services to create or compile, directly or indirectly, a collection, compilation, database, or directory without the prior written consent of Elka Technology Group.
  • Using automated tools to monitor, mirror, replicate, or reproduce the Services or any content therein, in whole or in part.
  • Circumventing, disabling, or interfering with any rate-limiting, access controls, CAPTCHA mechanisms, or other technological measures implemented by Elka Technology Group to regulate automated access to the Services.
  • Accessing or attempting to access application programming interfaces (APIs) in a manner that exceeds authorised rate limits, usage quotas, or scope of access as defined in the applicable API documentation or service agreement.
  • Reverse engineering, decompiling, disassembling, or otherwise attempting to derive the source code, algorithms, data structures, or underlying logic of any software, application, or system forming part of the Services.

3.3 Abuse of Platforms, Systems, and Services

Users shall not engage in any activity that constitutes abuse of the Services or that may impair the functionality, availability, or performance of the Services. Prohibited activities include, but are not limited to:

  • Using the Services in any manner that places an unreasonable or disproportionate load on the infrastructure, systems, or networks operated by Elka Technology Group or its service providers.
  • Conducting denial-of-service attacks, distributed denial-of-service attacks, or any other activity designed to disrupt, degrade, or overwhelm the availability or performance of the Services or any connected systems.
  • Attempting to gain unauthorised access to any systems, accounts, networks, servers, databases, or resources that belong to Elka Technology Group, its clients, its partners, or any third party.
  • Using the Services in a manner that adversely affects the ability of other users to access or use the Services, including but not limited to resource monopolisation, excessive bandwidth consumption, or storage abuse.
  • Creating multiple accounts, false identities, or fictitious entities for the purpose of circumventing restrictions, quotas, usage limits, or enforcement actions imposed by Elka Technology Group.
  • Exploiting any bug, vulnerability, error, or design flaw in the Services for any purpose, including but not limited to gaining unauthorised access, obtaining unintended functionality, or acquiring resources or data not intended for the User.
  • Using free tiers, trial accounts, or promotional offerings in a manner that violates the spirit or intent of such offerings, including the creation of multiple accounts to obtain additional free resources.

3.4 Circumvention of Security Measures

Users shall not attempt to bypass, disable, undermine, or otherwise circumvent any security measures, access controls, or protective technologies implemented by Elka Technology Group. Prohibited activities include, but are not limited to:

  • Attempting to probe, scan, test, or assess the vulnerability of any system, network, or service operated by Elka Technology Group without prior written authorisation.
  • Bypassing, disabling, or circumventing any authentication, authorisation, encryption, firewall, intrusion detection, or other security mechanism implemented to protect the Services.
  • Accessing or attempting to access data, systems, or functionality for which the User does not have authorisation, regardless of whether such access is technically possible.
  • Intercepting, monitoring, or capturing network traffic, communications, or data transmissions not intended for the User, including but not limited to packet sniffing, man-in-the-middle attacks, and session hijacking.
  • Using any credentials, access tokens, or authentication information belonging to another user without proper authorisation.
  • Sharing, distributing, or making available any exploit, vulnerability, or security weakness discovered in the Services to any party other than Elka Technology Group, except as permitted under a formal responsible disclosure agreement.

3.5 Distribution of Malware, Viruses, and Harmful Code

Users shall not use the Services to create, store, transmit, distribute, or otherwise make available any malicious software, code, or content. Prohibited activities include, but are not limited to:

  • Uploading, distributing, or transmitting any virus, worm, Trojan horse, ransomware, spyware, adware, keylogger, rootkit, or any other malicious software or code through the Services.
  • Using the Services to host, distribute, or facilitate the distribution of phishing pages, exploit kits, command-and-control infrastructure, or any other tools designed to compromise the security or integrity of computer systems.
  • Embedding malicious scripts, iframes, redirects, or code within content hosted on or delivered through the Services that may compromise the security, privacy, or integrity of any user's device or data.
  • Using the Services to conduct or facilitate any form of cyberattack, including but not limited to ransomware attacks, cryptojacking, credential stuffing, brute-force attacks, and SQL injection attacks.
  • Distributing software or code that is designed to disable, damage, or impair the operation of any computer system, device, network, or application.
  • Using the Services for the development, testing, or deployment of malicious tools, exploit code, or offensive security capabilities without the express prior written consent of Elka Technology Group and only within the scope of a formally authorised engagement.

3.6 Fraudulent, Deceptive, and Misleading Activities

Users shall not use the Services for any purpose that is fraudulent, deceptive, or misleading. Prohibited activities include, but are not limited to:

  • Impersonating any person, entity, or organisation, or falsely stating or otherwise misrepresenting an affiliation with any person, entity, or organisation.
  • Using the Services to conduct, support, or facilitate any fraudulent scheme, including but not limited to advance-fee fraud, investment fraud, identity fraud, phishing, or any form of social engineering designed to deceive individuals or organisations.
  • Creating, distributing, or promoting content that is intentionally false, misleading, or deceptive, including but not limited to fake reviews, fabricated testimonials, misleading product claims, or deceptive advertising.
  • Using the Services to engage in or facilitate money laundering, terrorist financing, sanctions evasion, or any other financial crime as defined by applicable law.
  • Operating or promoting fraudulent or deceptive websites, services, or applications through the Services, including but not limited to counterfeit goods, fake charities, and fraudulent investment platforms.
  • Engaging in price manipulation, market manipulation, or any other deceptive practice in connection with financial markets, cryptocurrency markets, or digital asset exchanges.
  • Using the Services to generate, distribute, or amplify disinformation or misinformation for the purpose of causing harm, influencing public opinion through deceptive means, or undermining the integrity of democratic processes.

3.7 Gambling, Adult Content, and Illegal Substances

Users shall not use the Services in connection with any activity involving gambling, adult content, or illegal substances. Prohibited activities include, but are not limited to:

  • Using the Services to operate, promote, facilitate, or support any form of online gambling, sports betting, casino games, lotteries, fantasy sports for money, or any other wagering activity, whether legal or illegal in the User's jurisdiction, unless expressly authorised in writing by Elka Technology Group.
  • Using the Services to host, distribute, transmit, or make available any pornographic, sexually explicit, obscene, or adult-oriented content, including but not limited to images, videos, text, or interactive material of a sexually explicit nature.
  • Using the Services to promote, sell, distribute, or facilitate the sale or distribution of controlled substances, narcotics, illicit drugs, drug paraphernalia, or any substance the possession, sale, or distribution of which is prohibited under applicable law.
  • Using the Services to promote, sell, distribute, or facilitate the sale of prescription medications without proper authorisation, licensure, and compliance with applicable pharmaceutical regulations.
  • Using the Services in connection with the promotion or facilitation of any activity related to the trafficking of persons, the exploitation of minors, or any other activity that is inherently harmful or exploitative.

3.8 Violation of Third-Party Terms of Service

Users shall not use the Services in any manner that causes Elka Technology Group, its clients, or its partners to be in violation of the terms of service, acceptable use policies, or other agreements of any third-party platform, service provider, or technology partner. Prohibited activities include, but are not limited to:

  • Using the Services to access, interact with, or extract data from any third-party platform or service in violation of that platform's or service's terms of service, acceptable use policy, or other applicable agreement.
  • Using the Services to circumvent restrictions, rate limits, access controls, or other measures implemented by third-party platforms or service providers.
  • Using the Services to create, manage, or operate accounts on third-party platforms in violation of those platforms' policies regarding account creation, automated access, or use of bots and scripts.
  • Using the Services in a manner that jeopardises Elka Technology Group's standing, accounts, or relationships with any third-party technology partner, cloud provider, hosting provider, or service provider.
  • Using the Services to facilitate or participate in the purchase, sale, or exchange of accounts, credentials, or access rights to third-party platforms in violation of those platforms' terms.

3.9 Unlawful Use

Users shall not use the Services for any purpose that is unlawful under any applicable local, national, or international law, regulation, or ordinance. Prohibited activities include, but are not limited to:

  • Using the Services to engage in, facilitate, support, or promote any activity that constitutes a criminal offence under the laws of any applicable jurisdiction.
  • Using the Services to violate any applicable export control laws, trade sanctions, embargoes, or other restrictions imposed by governmental authorities, including but not limited to those administered by the United States Department of the Treasury's Office of Foreign Assets Control (OFAC), the European Union, the United Nations Security Council, and the government of the United Kingdom.
  • Using the Services in any manner that facilitates tax evasion, bribery, corruption, or any other financial crime.
  • Using the Services to engage in or support the unauthorised surveillance, tracking, or monitoring of individuals without their knowledge and consent, except where such activity is expressly authorised by applicable law and conducted by authorised governmental authorities.
  • Using the Services to store, process, or transmit data in violation of applicable data protection and privacy legislation, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), the Protection of Personal Information Act (POPIA), and the Australian Privacy Act.
  • Using the Services in connection with any activity related to weapons of mass destruction, the arms trade, or military applications where prohibited by applicable law or regulation.

3.10 Harassment, Threats, and Abusive Conduct

Users shall not use the Services to engage in any form of harassment, threatening behaviour, or abusive conduct. Prohibited activities include, but are not limited to:

  • Sending, transmitting, or making available any content that is threatening, abusive, harassing, defamatory, libellous, slanderous, vulgar, obscene, or otherwise objectionable.
  • Engaging in stalking, cyberstalking, bullying, cyberbullying, intimidation, or any other conduct that is intended to harass, alarm, or cause distress to another person.
  • Making threats of violence, physical harm, or any other form of coercion against any individual, group, or organisation.
  • Engaging in hate speech, incitement to violence, or the promotion of discrimination on the basis of race, ethnicity, national origin, religion, gender, gender identity, sexual orientation, age, disability, or any other protected characteristic.
  • Disclosing or threatening to disclose another person's private or personally identifiable information ("doxing") without their consent.
  • Using the Services to coordinate, facilitate, or participate in any campaign of targeted harassment against any individual, group, or organisation.

3.11 Infringement of Intellectual Property Rights

Users shall not use the Services in any manner that infringes upon the intellectual property rights of Elka Technology Group or any third party. Prohibited activities include, but are not limited to:

  • Copying, reproducing, distributing, displaying, performing, or creating derivative works of any copyrighted material without the authorisation of the copyright holder.
  • Using the Services to host, distribute, or make available any content that infringes upon the copyrights, trademarks, patents, trade secrets, or other intellectual property rights of any third party.
  • Removing, altering, obscuring, or circumventing any copyright notices, watermarks, digital rights management (DRM) protections, or other proprietary notices or markings on content accessed through or distributed via the Services.
  • Using the trademarks, service marks, trade names, logos, or branding of Elka Technology Group without prior written consent, or in any manner that suggests endorsement, affiliation, or sponsorship where none exists.
  • Using the Services to facilitate piracy, counterfeiting, or the unauthorised distribution of copyrighted software, media, or other protected content.
  • Using the Services to develop, train, or deploy artificial intelligence models, machine learning systems, or similar technologies using content obtained in violation of applicable intellectual property laws or third-party rights.

4. System and Network Security

Elka Technology Group is committed to maintaining the security and integrity of its systems, networks, and the data entrusted to it by its users and clients. Users are expected to support these efforts by adhering to the following requirements:

  • Users shall take all reasonable measures to protect the confidentiality and integrity of their account credentials, including the use of strong, unique passwords and the enabling of multi-factor authentication where available.
  • Users shall promptly notify Elka Technology Group of any suspected or confirmed security breach, unauthorised access, or compromise of their account credentials by contacting compliance@elkatechnology.com.
  • Users shall ensure that all devices and systems used to access the Services are maintained in a secure state, including the timely application of security patches, the use of current antivirus and anti-malware software, and the implementation of appropriate firewall configurations.
  • Users shall not use the Services to conduct security testing, penetration testing, vulnerability scanning, or any other security assessment activity against any system, network, or service without the express prior written authorisation of Elka Technology Group and the owner of the target system.
  • Users shall comply with all security-related instructions, guidelines, and directives issued by Elka Technology Group, including but not limited to incident response procedures, data handling requirements, and access control policies.
  • Users who discover any security vulnerability, weakness, or defect in the Services are requested to report such findings promptly and confidentially to Elka Technology Group at compliance@elkatechnology.com, and to refrain from exploiting, publicising, or disclosing the vulnerability to any third party until it has been addressed.
  • Elka Technology Group may, at its sole discretion, suspend or restrict access to the Services for any User whose systems or activities are determined to pose a security risk to the Company's infrastructure, other users, or third parties.

5. Reporting Violations

Elka Technology Group encourages all users, clients, partners, and members of the public to report suspected violations of this Policy. Reports may be submitted through the following channels:

  • Email: Reports may be submitted by email to compliance@elkatechnology.com. When submitting a report, please include as much detail as possible, including the nature of the suspected violation, the identity of the parties involved (if known), the date and time of the suspected activity, and any supporting evidence such as screenshots, log files, or message headers.
  • Contact Form: Reports may also be submitted through the contact form available on the Contact page of the Elka Technology Group website.

Elka Technology Group takes all reports of policy violations seriously and will investigate each report in a timely and thorough manner. The Company will endeavour to maintain the confidentiality of the reporter's identity to the extent permitted by applicable law and the requirements of the investigation.

Elka Technology Group prohibits retaliation against any individual who, in good faith, reports a suspected violation of this Policy. Any person who believes they have been subjected to retaliation in connection with a report made under this Policy should contact compliance@elkatechnology.com immediately.

The Company reserves the right to involve law enforcement authorities where it reasonably believes that a violation of this Policy may constitute a criminal offence or may pose a risk to the safety of any person.

6. Enforcement and Consequences

Elka Technology Group reserves the right to investigate and take appropriate action in response to any suspected or confirmed violation of this Policy. Enforcement actions may be taken at the sole discretion of the Company and may include, without limitation, one or more of the following measures:

  • Warning: The User may receive a formal written warning identifying the nature of the violation and the corrective action required.
  • Suspension: Access to the Services may be temporarily suspended, in whole or in part, pending the outcome of an investigation or to prevent ongoing harm.
  • Termination: The User's access to the Services may be permanently terminated, and any applicable service agreements may be cancelled without refund or compensation.
  • Content Removal: Any content that violates this Policy may be removed, disabled, or rendered inaccessible without prior notice.
  • Referral to Law Enforcement: Suspected criminal activity may be reported to the appropriate law enforcement authorities, and Elka Technology Group may cooperate fully with any resulting investigation.
  • Legal Action: Elka Technology Group may pursue any available legal remedies, including but not limited to claims for damages, injunctive relief, and recovery of legal costs.
  • Notification to Third Parties: Where appropriate, Elka Technology Group may notify affected third parties, including other service providers, industry bodies, and regulatory authorities, of the violation.

The severity of the enforcement action taken will depend on the nature and gravity of the violation, the extent of any harm caused, the User's history of compliance, and any other factors that Elka Technology Group considers relevant. The Company may take immediate action, including suspension or termination of access, without prior warning in cases involving serious or repeated violations, or where immediate action is necessary to protect the integrity of the Services or the safety of any person.

Enforcement of this Policy does not limit any other rights or remedies available to Elka Technology Group under applicable law, contract, or equity.

7. Monitoring and Compliance

Elka Technology Group reserves the right to monitor, review, and analyse the use of its Services to ensure compliance with this Policy, applicable laws, and the terms of any applicable service agreements. Monitoring activities may include, but are not limited to:

  • Automated monitoring of network traffic, system logs, and usage patterns to detect activity that may indicate a violation of this Policy.
  • Review of content hosted on, transmitted through, or stored within the Services to assess compliance with this Policy and applicable law.
  • Periodic audits of user accounts, access permissions, and system configurations to ensure adherence to security and compliance requirements.
  • Investigation of reports and complaints received from users, third parties, or automated detection systems.

Elka Technology Group will conduct all monitoring activities in accordance with applicable data protection and privacy legislation, and will limit the collection, use, and retention of personal data to what is necessary and proportionate for the purpose of ensuring compliance with this Policy.

By using the Services, the User acknowledges and consents to the monitoring activities described in this section. Users who are subject to specific data protection requirements or contractual obligations regarding the monitoring of their communications should contact Elka Technology Group to discuss applicable arrangements.

The Company does not guarantee that it will detect all violations of this Policy, and the absence of enforcement action in any particular instance shall not be construed as a waiver of the Company's right to enforce this Policy in future instances.

8. Modifications to This Policy

Elka Technology Group reserves the right to modify, amend, supplement, or replace this Policy at any time and at its sole discretion. Any modifications will become effective upon publication of the revised Policy on the Elka Technology Group website.

Where practicable, the Company will provide reasonable advance notice of material changes to this Policy, such as by posting a notice on the website, sending an email notification to registered users, or by other appropriate means. However, Elka Technology Group is not obligated to provide advance notice of all changes, and certain changes may take effect immediately where required by law, regulation, or urgent operational necessity.

Users are responsible for regularly reviewing this Policy to remain informed of any changes. Continued use of the Services following the publication of any modifications constitutes acceptance of the revised Policy. If a User does not agree with the modified terms, they must discontinue all use of the Services.

The "Effective Date" at the top of this Policy indicates the date on which the most recent version of the Policy was published. Previous versions of this Policy may be made available upon request.

9. Contact Information

For questions, concerns, or reports relating to this Acceptable Use Policy, Users may contact the Elka Technology Group Compliance team through the following channels:

  • Email: compliance@elkatechnology.com
  • Website: Contact Page

Elka Technology Group will endeavour to acknowledge receipt of all enquiries within a reasonable timeframe and to respond substantively as soon as practicable. For urgent matters relating to security incidents or suspected criminal activity, Users are encouraged to mark their communications accordingly to ensure timely handling.

This Acceptable Use Policy constitutes a binding agreement between the User and Elka Technology Group with respect to the User's use of the Services. All rights not expressly granted in this Policy are reserved by Elka Technology Group.

Elka Technology Group

A global information and communications technology company providing reliable services to organisations worldwide.

Company

  • About Us
  • Services
  • Industries
  • Careers
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Acceptable Use Policy

Governance

  • Compliance & Ethics
  • Disclaimer
© 2026 Elka Technology Group. All rights reserved. Privacy · Terms · Cookies
This website uses essential cookies to ensure proper functionality. By continuing to use this site, you consent to our use of cookies. Learn more.