Aegix Global, LLC

Acceptable Use Policy

Aegix Platform — Safety and Incident Management · Last reviewed 2026-04-03

Aegix Global, LLC

Effective Date: April 2, 2026

1. PURPOSE AND SCOPE

This Acceptable Use Policy (AUP) defines acceptable and prohibited uses of Aegix Global, LLC's information systems, networks, data, and infrastructure. This policy applies to all persons who have access to Aegix systems, including:

This policy covers company-issued devices, company-issued or managed software, company networks, and personal devices used to access company systems or data (BYOD).

2. GENERAL USE PRINCIPLES

Aegix provides information systems, networks, and data access to enable employees to perform their job duties. The following principles govern all use:

3. ACCEPTABLE USE

Users may use Aegix systems for the following purposes:

4. PROHIBITED USE

The following uses are strictly prohibited:

5. CUSTOMER DATA HANDLING

Aegix handles Personally Identifiable Information (PII) and other regulated data from a range of Authorized Customers across multiple sectors — K-12 school districts and charter networks; colleges and universities; federal, state, local, tribal, and military government agencies; healthcare organizations; corporate, religious, summer-camp, sports, and entertainment-venue site operators. Each sector triggers different regulatory obligations. All employees must understand and comply with the following.

Data Classification

Customer Data is classified per the Aegix Data Classification Policy. The most sensitive tiers (Restricted-PII, Restricted-Student-Record-PII, and PHI under executed BAAs) require strict access and handling controls.

Sector-Specific Regulatory Compliance

Access and Processing

6. EMAIL AND COMMUNICATIONS

7. PASSWORD AND AUTHENTICATION

8. REMOTE ACCESS

9. INCIDENT REPORTING

Security incidents and suspected policy violations must be reported immediately:

Aegix prohibits retaliation against employees who report suspected policy violations or security incidents in good faith. Failure to report known incidents is itself a policy violation and may result in disciplinary action.

10. CONSEQUENCES OF VIOLATION

Violations of this policy may result in disciplinary action, up to and including immediate termination of employment:

Legal consequences: Violations involving Customer Data may trigger breach notification obligations under (depending on sector) FERPA, COPPA, state student-data-privacy laws, the HIPAA Breach Notification Rule and executed BAAs, FedRAMP / FISMA incident-reporting requirements, CPRA / VCDPA / CPA / CTDPA / TDPSA / OCPA, and the executed Master Subscription Agreement. Aegix may pursue legal action to recover damages, and employees may face personal liability.

11. NIST 800-53 CONTROL MAPPING

This policy supports the following NIST SP 800-53 Rev 5 security controls:

Control ID Control Title
PL-4 Rules of Behavior
AC-20 Use of External Systems
AT-2 Literacy Training and Awareness
PS-6 Access Agreements
PS-8 Personnel Sanctions

12. COMPLIANCE FRAMEWORK

This policy aligns with the following regulatory frameworks and standards:

13. ACKNOWLEDGMENT

By signing below, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy. Failure to comply with this policy may result in disciplinary action up to and including termination of employment.

Employee Name (Printed)

_____________________________

Employee Title

_____________________________

Employee Signature

_____________________________

Date

_____________________________

Aegix Global, LLC

94 Lone Hollow Dr.

Sandy, UT 84092

Appendix: Vendor Compliance Documentation References

The following vendor documentation provides supporting evidence for the compliance claims and technical controls referenced in this document. These resources should be reviewed periodically to ensure alignment with current vendor certifications and capabilities.

Amazon Web Services (AWS)

Note: AWS compliance reports (SOC 2 Type II, ISO 27001) are available for download through AWS Artifact in the AWS Management Console. Contact the CPTO for access credentials.