Legal · Acceptable use policy

Acceptable use.

Last updated April 16, 2026
This policy describes how our services may and may not be used. It protects you, other clients, our team, and the people and systems we touch in the course of our work. Violations can result in suspension or termination, and in some cases, referral to authorities.

01 — ScopeWho this applies to

This policy applies to anyone engaging CD Grayson for services, hosting content on our infrastructure, or otherwise interacting with our systems. It also governs the boundaries of our security testing work.

02 — AuthorizationFor security work

Penetration testing, vulnerability scanning, and other offensive security activities require explicit written authorization before we touch any system. Our standard practice:

Engaging us to test systems you do not have authority to test is a material breach and may be a crime. Don't ask.

03 — Prohibited usesOf our services

You may not use our services — including any hosting or infrastructure we provide — to:

04 — DisclosureHandling vulnerabilities

When we identify vulnerabilities during a client engagement, we disclose them only to the client. We don't publish vulnerability details, sell them, or use them against any other party.

If we identify a vulnerability in a product used by our client but owned by a third party, we'll discuss the appropriate response with our client — typically coordinated disclosure to the vendor on a reasonable timeline, not public release or exploitation.

If you discover a vulnerability in our own infrastructure, please report it to hello@cdgrayson.net with subject line "Security." We'll respond promptly and won't pursue good-faith researchers.

05 — ConductClient obligations

Clients engaging us for security or data work are expected to:

06 — High-risk contentOn hosting

If your engagement includes hosting or managed infrastructure, some categories of content require special handling. Before deploying the following on our infrastructure, discuss the specifics with us first:

These aren't categorically prohibited — many are legitimate businesses — but they carry compliance, legal, and infrastructure implications we need to address together before you go live.

07 — ResourcesAcceptable usage

Hosting and compute services are provided under the terms of your specific engagement. You may not use them in ways that substantially exceed the resources the SOW contemplates, disrupt other clients, or compromise infrastructure shared with others.

08 — DMCACopyright complaints

We comply with the Digital Millennium Copyright Act. To report content hosted on our infrastructure that you believe infringes your copyright, send notice to hello@cdgrayson.net including:

We review notices, act on legitimate ones, and terminate the accounts of repeat infringers.

09 — AbuseReporting violations

To report a violation of this policy — spam, malware, fraud, abuse, harassment — email hello@cdgrayson.net with subject line "Abuse," and include URLs, IP addresses, or account identifiers plus a description of what you observed. We review all reports and act on legitimate ones.

10 — EnforcementHow we respond

We respond proportionally. For most issues, we'll raise the concern, explain the problem, and give a reasonable chance to fix it. For serious violations — CSAM, active attacks, severe fraud, criminal activity — we may suspend or terminate without notice and report to authorities. We cooperate with law enforcement when required by valid legal process.

11 — ChangesPolicy updates

We may update this policy as the environment changes. Material updates will be communicated to active clients. The "last updated" date at the top always reflects the current version.

12 — QuestionsIf you're unsure

If you're unsure whether a planned use falls within this policy, ask us before you start. Email hello@cdgrayson.net.