Acceptable Use Policy

Using this site responsibly and safely

This Acceptable Use Policy explains how you may use the LW IT Solutions website, including our pages, downloads, and contact forms. It exists to protect visitors and our systems from misuse, fraud, and disruption. By accessing or using the site, you agree to follow the rules below.
You may browse the site and contact us for legitimate business enquiries. You must not attempt to disrupt the site, probe for vulnerabilities, upload malicious content, or misuse any forms or email addresses. If we believe activity is abusive or unlawful, we may restrict access, remove content, or report the matter to relevant authorities where appropriate.

Get an expert-led assessment with a prioritised remediation backlog.

Request an assessment

Who this is for

We want to be as transparent as possible

This policy applies to anyone who visits this website, uses our contact forms, downloads resources, or otherwise interacts with site features and content.

  • Prospective customers making genuine enquiries
  • Partners and suppliers contacting us for business purposes
  • Visitors accessing public pages and resources
  • Anyone submitting information through forms or email links on the site

Permitted use

What can You Do?

You may use the site for lawful purposes, to learn about our services, and to contact us about work we offer. We may provide downloads or templates for convenience. Where we do, you may use them for your internal evaluation and planning, unless we state otherwise on the page.

  • Accessing and viewing pages for personal or business use
  • Submitting legitimate enquiries and requests for information
  • Downloading resources for evaluation and internal use
  • Sharing links to our pages, provided you do not misrepresent their source

Prohibited use

What Can you not do?

You must not misuse this site or attempt to harm, interfere with, or gain unauthorised access to any part of it. The examples below are not exhaustive.

  • Attempting to access, scan, probe, or test systems or networks without permission
  • Introducing malware, ransomware, spyware, or any other harmful code or payload
  • Trying to bypass security controls, rate limits, or access restrictions
  • Launching denial-of-service attacks or otherwise disrupting availability
  • Using automated tools to scrape content or collect data in a way that degrades performance
  • Submitting false, misleading, or fraudulent information through forms
  • Sending spam, bulk messages, or unsolicited marketing via forms or published contact details
  • Uploading or transmitting content that is unlawful, defamatory, abusive, or infringes intellectual property rights

Use of contact forms and communications

Its important to clarify what we expect

Forms and contact channels are provided for genuine enquiries. Please ensure the information you submit is accurate and does not include sensitive personal data unless it is necessary for your request. Do not share credentials, payment card details, or confidential client information through website forms.

  • Use forms for legitimate business contact only
  • Do not include passwords, access tokens, or other credentials
  • Do not submit special category personal data unless explicitly requested
  • Do not attempt to attach or upload unsafe files

Reporting security issues

Do not hesitate to alert us to an issue

If you believe you have found a security issue on this website, please report it responsibly using our contact page. Do not publicly disclose the issue or attempt to access data that is not intended for you. We aim to review reports promptly and take appropriate action.

If you are reporting a potential vulnerability, include the page URL, a clear description, and steps to reproduce where safe to do so.

How we enforce this policy

Security is at the heart of what we do

We may take action to protect the site and our users, including blocking IP addresses, limiting access, removing content, or suspending use of forms. Where we reasonably believe activity is unlawful or poses a material risk, we may share relevant information with service providers or law enforcement.

  • Rate limiting, filtering, and access controls to prevent abuse
  • Blocking or restricting access where misuse is detected
  • Preserving logs and evidence where needed for investigation
  • Escalation to appropriate authorities where required

Changes to this policy

Who doesn't like an update?

We may update this Acceptable Use Policy from time to time to reflect changes in the site, security practices, or legal requirements. The latest version will be published on this page and will apply from the date it is posted.

What happens next

if you have a question - we are here to help

  1. Use the site normally for browsing, downloads, and legitimate enquiries
  2. If you need help, contact us with the minimum information required to respond
  3. If you spot misuse or a security issue, report it promptly via our contact page

We use reasonable safeguards to protect the site. Please avoid sending sensitive information through web forms.

Talk through your requirements and leave with a clear next-step plan.

Book a discovery call