Overview
This Acceptable Use Policy ("AUP") defines the acceptable and prohibited uses of SOC Defenders. This policy is designed to protect our community, maintain the quality of our platform, and ensure compliance with applicable laws.
By using SOC Defenders, you agree to comply with this policy. Violations may result in content removal, account suspension, or permanent ban.
Acceptable Uses
SOC Defenders is intended for:
- Sharing cybersecurity news, research, and educational content
- Discussing threat intelligence and defensive security practices
- Learning about cybersecurity topics and career development
- Networking with fellow security professionals
- Staying informed about vulnerabilities and security updates
- Contributing to community knowledge through quality submissions
Prohibited Activities
Illegal Activities
You may not use SOC Defenders to:
- Engage in or promote any illegal activities
- Share content that violates any applicable law or regulation
- Distribute malware, exploits, or tools intended for unauthorized access
- Coordinate or plan cyberattacks or other criminal activities
- Evade legal processes or law enforcement
Harmful Content
You may not post content that:
- Contains active malware, ransomware, or malicious code
- Provides step-by-step instructions for committing crimes
- Reveals personal information about individuals without consent (doxing)
- Contains threats of violence or incites harm
- Promotes hate speech, discrimination, or harassment
- Includes child exploitation material (immediate law enforcement referral)
Security Violations
You may not:
- Attempt to gain unauthorized access to SOC Defenders systems
- Probe, scan, or test our systems for vulnerabilities without permission
- Interfere with or disrupt our services or infrastructure
- Circumvent security measures, authentication, or access controls
- Intercept or monitor data not intended for you
- Use the platform to attack or compromise other systems
Spam and Manipulation
You may not:
- Create multiple accounts to manipulate voting or karma
- Use bots or automated systems to submit content or votes
- Engage in coordinated inauthentic behavior
- Post excessive self-promotional content
- Spam comments or submissions
- Artificially inflate engagement metrics
Impersonation and Deception
You may not:
- Impersonate other users, organizations, or public figures
- Create misleading usernames or profiles
- Spread disinformation or intentionally false information
- Misrepresent your affiliation with any organization
- Use deceptive practices to gain trust or information
Intellectual Property Violations
You may not:
- Post content that infringes on copyrights or trademarks
- Share pirated software or license keys
- Reproduce substantial portions of articles without permission
- Remove or alter copyright notices or attributions
Content Guidelines
Quality Standards
We encourage content that:
- Provides value to the cybersecurity community
- Is accurate, well-sourced, and verifiable
- Contributes to constructive discussion
- Respects intellectual property and gives proper attribution
Vulnerability and Exploit Information
When sharing vulnerability information:
- Follow responsible disclosure practices
- Do not share zero-day exploits for unpatched vulnerabilities
- Include remediation information when possible
- Focus on defense rather than offense
- Respect vendor disclosure timelines
Threat Intelligence Sharing
When sharing threat intelligence:
- Ensure information is suitable for public disclosure
- Do not share TLP:RED or restricted information
- Validate IOCs before sharing to minimize false positives
- Provide context for why the information is relevant
API and Automated Access
If you wish to access SOC Defenders programmatically:
- Contact us first to discuss your use case
- Respect rate limits and do not overload our systems
- Identify your application with an appropriate User-Agent
- Do not scrape content for commercial purposes without permission
- Cache responses appropriately to minimize requests
Enforcement
We reserve the right to investigate and take action against violations of this policy. Actions may include:
- Warning: First-time minor violations may result in a warning
- Content Removal: Violating content will be removed
- Temporary Suspension: Account may be suspended for repeated violations
- Permanent Ban: Severe or repeated violations result in permanent ban
- Legal Action: Criminal activity may be reported to law enforcement
Enforcement decisions are at our sole discretion. We are not obligated to provide warnings before taking action.
Reporting Violations
If you encounter content that violates this policy, please report it:
- Use the flag feature on the content (requires karma)
- Email abuse@socdefenders.ai
- For urgent security issues, email security@socdefenders.ai
Please include specific details about the violation and links to the content in question.
Appeals
If you believe your content was removed or account was actioned in error, you may appeal by emailing appeals@socdefenders.ai. Include:
- Your username
- Description of the action taken
- Why you believe it was in error
- Any relevant context
We will review appeals and respond within 5 business days. Appeal decisions are final.
Changes to This Policy
We may update this Acceptable Use Policy from time to time. Significant changes will be communicated through the platform. Continued use after changes constitutes acceptance of the updated policy.
Contact
Questions about this policy? Contact us at legal@socdefenders.ai.