Acceptable Use Policy

Executive Protection Advance Survey
Effective Date: April 25, 2026
ISCG Labs, Inc. • iscgconsulting.com

1. Purpose and Scope

This Acceptable Use Policy ("AUP" or "Policy") governs the use of the Executive Protection Advance Survey platform ("Service") provided by ISCG Labs, Inc. ("ISCG," "Company," "we," "our," or "us"). This Policy applies to all users of the Service, including survey creators and authorized collaborators.

The Service is a professional tool designed for legitimate executive protection and security advance operations. Any violation of this Policy may result in suspension or termination of your account, forfeiture of prepaid fees, and referral to law enforcement authorities.

2. Intended Use

The Service is designed for executive protection professionals, security consultants, and other authorized personnel engaged in lawful protective operations. Intended uses of the Service include:

3. Prohibited Uses

3.1 Surveillance Without Authorization

You may not use the Service to conduct surveillance of any individual, location, or organization without proper authorization or lawful basis. This includes, but is not limited to:

3.2 Unauthorized Vulnerability Documentation

You may not use the Service to document security vulnerabilities for purposes other than legitimate protective operations. This includes:

3.3 Stalking and Harassment

You may not use the Service to facilitate stalking, harassment, intimidation, or threats against any person. This includes:

3.4 Surveys Without Legitimate Professional Engagement

You may not create or maintain surveys without a legitimate professional purpose. A "legitimate professional purpose" includes:

Training and demonstration surveys must not contain real threat assessments, actual principal identities, or genuine vulnerability data unless created within the context of an authorized training program.

You may not use the Service for personal curiosity, recreational purposes, or any non-executive-protection activity. You may not assess locations without a professional role, authorization, or lawful reason to do so.

3.5 Unauthorized Credential and Data Sharing

You may not:

3.6 Criminal Activity

You may not use the Service to plan, facilitate, or support any criminal activity. This includes, but is not limited to:

3.7 Other Prohibited Activities

4. Collaboration Feature Guidelines

The Service permits each survey to be shared with up to 2 collaborators. All collaborators must hold active, individually paid subscriptions to the Service.

4.1 Collaborator Requirements

You may only share surveys with individuals who hold active, individually paid subscriptions to the Service. The Service will not permit sharing with non-subscribers. Each collaborator is independently bound by these Terms of Service, this Acceptable Use Policy, and all other governing documents. Survey creators are responsible for verifying that each collaborator has a legitimate professional need for access to the shared survey.

4.2 Creator Responsibility

The survey creator retains full ownership of the survey and is the only person who can delete it. Deletion of a survey removes all sharing records and collaborator access. The creator must revoke collaborator access when:

4.3 Collaborator Obligations

Collaborators must use shared survey data solely for the purpose of the protective operation for which access was granted. Collaborators may not export, copy, screenshot, photograph, or otherwise reproduce shared survey data outside the scope of the authorized engagement. Collaborators may not share their access or grant further access to any other person. Violation of these obligations may result in enforcement action against the collaborator's own independent account, up to and including termination.

4.4 Revocation of Access

Survey creators may revoke collaborator access at any time. The Company reserves the right to revoke any subscriber's collaboration privileges, or to sever a specific sharing relationship, if it determines that the collaboration feature is being misused or that continued shared access poses a risk to the security, integrity, or lawful use of the Service.

5. Investigation and Enforcement

5.1 Right to Investigate

ISCG reserves the right to investigate suspected violations of this Policy. ISCG does not access, view, or analyze your encrypted survey data in the ordinary course of business. However, ISCG may investigate account-level activity, usage patterns, and metadata when it has a reasonable basis to believe that a violation of this Policy has occurred.

5.2 Indicators of Misuse

Indicators that may give rise to an investigation include, but are not limited to:

5.3 Enforcement Actions

Depending on the severity and nature of the violation, ISCG may take one or more of the following actions:

Imminent Threat Exception: In situations where ISCG reasonably believes there is an imminent threat to the physical safety of any person, ISCG may immediately: (a) suspend the account, (b) preserve all account data and metadata, and (c) refer the matter to law enforcement, without prior warning or investigation. ISCG is not required to notify the user first. ISCG shall have no liability for good faith actions taken under this provision, even if the perceived threat is later determined to be unfounded.

Upon Termination for Policy Violation: ISCG may immediately delete all survey data, encryption keys, and collaboration records without waiting for the billing period to end and without providing an opportunity to export data. Collaborators who had access to the terminated user's surveys will lose access immediately. ISCG is not obligated to notify collaborators of the reason for termination.

5.4 No Obligation to Monitor

Enforcement of this Policy is at ISCG's sole discretion. The absence of enforcement action in any particular instance does not constitute a waiver of ISCG's right to take action in the future.

5.5 Access to Encrypted Content

Investigation of suspected violations relies on account-level metadata, usage patterns, and information from the reporting party. ISCG will NOT decrypt, access, or review encrypted survey data unless:

Any such access will be documented, limited in scope to the specific concern, and disclosed to the affected user unless disclosure is prohibited by law or an active law enforcement investigation. This provision does not limit ISCG's obligations under Section 12 of the Terms of Service regarding compliance with legal process.

6. Reporting Mechanism

6.1 How to Report

If you become aware of any suspected violation of this Policy, please report it by email to: abuse@iscgconsulting.com

Subject Line: "Acceptable Use Policy — Report of Suspected Violation"

6.2 Information to Include

To assist in our investigation, please include the following information in your report:

6.3 Confidentiality of Reports

All reports will be treated as confidential. The identity of the reporting party will not be disclosed unless required by legal process or with the reporter's consent.

6.4 No Retaliation

Retaliation against any person who makes a good-faith report of a suspected violation is strictly prohibited. Any user who retaliates against a reporter will be subject to enforcement action up to and including termination.

6.5 Response

ISCG will acknowledge receipt of all reports within 48 hours and will investigate all reports in a timely manner. ISCG is not obligated to disclose the outcome of any investigation except as required by law.

7. Liability, Indemnification, and Survival

Your use of the Service is subject to the limitation of liability, warranty disclaimer, and indemnification provisions set forth in Sections 17 and 18 of the Terms of Service, which are incorporated herein by reference.

A violation of this Acceptable Use Policy constitutes a breach of the Terms of Service for purposes of indemnification under Section 18.1(c) and Section 18.1(g) of the Terms of Service.

The provisions of this Policy addressing liability, indemnification, and dispute resolution shall survive the termination of your subscription and these Terms.

By using the Executive Protection Advance Survey, you acknowledge that you have read, understood, and agree to be bound by this Acceptable Use Policy.