Acceptable Use Policy

Permitted Use

  • Data encryption and protection with explicit authorization
  • Protecting sensitive business documents and personal files
  • Compliance with data protection regulations (GDPR, HIPAA, etc.)
  • Educational purposes in controlled environments
  • Secure key management and storage
  • Professional security research and testing

Prohibited Use

  • Unauthorized access to data or systems
  • Malicious encryption or ransomware activities
  • Violation of any laws or regulations
  • Using the software to hide illegal activities
  • Circumventing organizational security policies
  • Sharing encryption keys or credentials with unauthorized parties

Professional Standards

  • Users must maintain professional standards when using Cryptio
  • Respect intellectual property rights and privacy laws
  • Report security vulnerabilities responsibly
  • Follow best practices for encryption key management