This page is a non-authoritative summary, not a binding policy. The binding policy is the Information Security Policy → Acceptable Use. In any conflict between this page and the Information Security Policy, the Information Security Policy controls.
This page is the user-facing summary of the Acceptable Use rules in the Information Security Policy. It is not a separate policy — for the complete and authoritative version, see the Information Security Policy → Acceptable Use.

In short

  • Use Neuroscale systems and resources for legitimate business purposes.
  • Reasonable personal use is allowed, but Neuroscale data and devices remain company property.
  • Protect proprietary information per the Data Management Policy.
  • Promptly report theft, loss, or unauthorized disclosure to security@neuroscale.ai.
  • Authorized individuals may monitor equipment, systems, and network traffic at any time.

Don’t

See Unacceptable Use for the full list. The most common ones:
  • Don’t share your password — ever, even with family.
  • Don’t install unlicensed or pirated software.
  • Don’t access data, accounts, or systems you don’t have a business need to access.
  • Don’t introduce malware, run port/security scans without prior notification, or attempt to circumvent security controls.
  • Don’t send spam, harass anyone, or forge email headers.
  • Don’t share lists of Neuroscale employees, contractors, partners, or customers with outside parties without authorization.

Acknowledgement

You acknowledged the Information Security Policy (the binding document this page summarizes) at hire, and re-acknowledge annually in Vanta. If you haven’t seen the prompt recently, ping CHRO.

Document status

This page tracks the Information Security Policy and is updated when that policy changes. No separate version history is maintained for this summary; the version of record is the version stamped on the Information Security Policy.