This Acceptable Use Policy (“AUP”) outlines the acceptable and prohibited uses of Triangle Tech LLC's services, systems, and networks.
Purpose
Triangle Tech LLC provides managed IT services, network access, and technology solutions to businesses in the Research Triangle area. This policy ensures that all users understand their responsibilities and the limitations of use.
Acceptable Use
You may use our services for lawful business purposes, including:
- Normal business operations and communications
- Accessing company resources and applications
- Sending and receiving business-related emails
- Storing and sharing business documents
- Accessing the internet for work-related activities
Prohibited Activities
The following activities are strictly prohibited:
- Illegal Activities: Using our services for any unlawful purpose, including fraud, theft, or violation of any laws
- Malicious Software: Intentionally introducing viruses, malware, ransomware, or other harmful code
- Unauthorized Access: Attempting to access systems, networks, or data without authorization
- Spam and Phishing: Sending unsolicited bulk emails or phishing attempts
- Network Abuse: Actions that disrupt or degrade network performance for others
- Copyright Infringement: Distributing copyrighted material without authorization
- Harassment: Using services to harass, threaten, or harm others
- Resource Abuse: Excessive use of resources that impacts service for other clients
Security Requirements
All users must:
- Keep passwords confidential and secure
- Report suspected security incidents immediately
- Not share login credentials with unauthorized persons
- Follow security awareness training guidelines
- Keep devices updated with security patches
- Use multi-factor authentication when available
Email and Communications
When using email and communication services provided by Triangle Tech:
- Do not send emails that could be considered spam
- Do not open suspicious attachments or links
- Report phishing attempts to the IT team
- Use business email for business purposes only
- Do not send sensitive data without encryption
Data and Privacy
- Handle client and customer data according to privacy regulations
- Do not store sensitive personal data on unauthorized systems
- Report data breaches or potential privacy violations immediately
- Follow data retention policies
Monitoring
Triangle Tech reserves the right to monitor system and network usage to ensure compliance with this policy, maintain security, and investigate potential violations. Users should have no expectation of privacy when using company systems.
Enforcement
Violations of this Acceptable Use Policy may result in:
- Temporary or permanent suspension of services
- Termination of service agreement
- Reporting to law enforcement if illegal activities are involved
- Legal action to recover damages
Reporting Violations
If you become aware of any violations of this policy, please report them immediately to:
- Email: support@nctriangletech.com
- Phone: (919) 446-5484
Policy Updates
Triangle Tech may update this policy at any time. Users will be notified of significant changes. Continued use of services after policy updates constitutes acceptance of the new terms.