Last updated: 12/03/2025 14:55
The resources managed by SCAYLE are configured and operated to effectively serve a wide and diverse group of users. For this reason, it is essential that all individuals accessing these resources are aware of, understand, and accept the terms of use as well as the security regulations established by SCAYLE. These regulations primarily follow Spanish legislation, without prejudice to other recommendations and regulations applicable depending on specific circumstances or the user’s origin.
Below are some key mandatory compliance elements recorded in the 📜Security Regulations in accordance with the provisions of the National Security Framework ENS and our 📜Service Terms of Use . For full details, we invite you to review the complete information.
Users must maintain the security of all SCAYLE resources:
🆔 User Identifiers:
Each project manager commits to:
✅ Assigning an account to each member of their group.
✅ Identifying the person to whom each user account has been assigned.
🚫 These user identifiers must not be shared under any circumstances and should be used strictly within the contracted scope.
🔑 Passwords:
🔹 Users must follow the password policy established by SCAYLE.
🔹 They commit not to share or disclose passwords.
🔹 Passwords should be changed periodically and whenever their confidentiality is suspected or compromised. 🔄
The following cases are considered violations of SCAYLE resource usage policies:
🚫 Unauthorized use of user identifiers (username/password) by third parties on IT systems (with or without the knowledge of official users), both by the person who gains improper access and the account holder, as well as non-compliance with the terms of software licenses acquired at SCAYLE.
🔍 Attempting to retrieve passwords from other users.
🛑 Any attempt to find and exploit security vulnerabilities in SCAYLE's or third-party IT systems.
💥 Using SCAYLE systems to attack any IT system.
🛠️ Creating, using, or storing programs or information that could be used to attack SCAYLE’s or third-party IT systems, except for those expressly authorized to perform such tasks to ensure the security and operability of SCAYLE’s services.
🦠 Intentionally introducing viruses or any other malicious or harmful software.
🔄 Altering the integrity, improper use, or manipulation of data.
❌ Failing to maintain IT resources under the user’s responsibility with the necessary security measures.
⚡ Non-compliance with these regulations at any level will result in the immediate suspension of the provided service and/or temporary blocking of systems or accounts, to ensure the proper functioning of SCAYLE services. 🚨
Last updated: 12/03/2025 14:55