DekkoSecure Acceptable Use Policy

Applies to: DekkoCore-AU (au.dekko.io), DekkoCore-CA (ca.dekko.io), DekkoCore-US (us.dekko.io), DekkoCore-CH (ch.dekko.io), and DekkoDEMS (fusion.dekko.io) (the “Services”).

Entity: Securest Pty Ltd (ABN 31 166 558 676) trading as DekkoSecure (“DekkoSecure”, “we”, “us”, or “our”)

1. Purpose

This Acceptable Use Policy (“Policy”) sets out the rules for using DekkoSecure’s services (the “Services”).

It ensures all users act responsibly, lawfully, and in a manner consistent with DekkoSecure’s security, privacy, and operational standards.

This Policy applies to all individuals and organisations who access or use the Services, including Customers, Authorised Users, and Invited Participants (“Users”).


2. Responsible Use

Users must:

  • Use the Services only for lawful and authorised purposes;

  • Take reasonable measures to protect the confidentiality of all information shared through the Services;

  • Comply with applicable laws, contracts, and organisational policies;

  • Follow DekkoSecure’s published documentation and security requirements; and

  • Immediately report any suspected misuse, data breach, or unauthorised access to your organisation’s administrator or DekkoSecure Support.


3. Prohibited Activities

Users must not use the Services to:

  • Break the law – including storing, transmitting, or sharing unlawful, defamatory, discriminatory, or obscene content.

  • Compromise security – such as attempting to bypass encryption, authentication, or access controls, or introducing malware or harmful code.

  • Access without authorisation – including attempting to access other users’ data or the Service’s underlying infrastructure.

  • Disrupt or degrade the Service – including denial-of-service attacks, automated scraping, excessive traffic generation, or interference with system performance.

  • Infringe on rights – including intellectual property, privacy, or data protection rights of others.

  • Misuse communication tools – including spamming, phishing, harassment, or using chat, messaging, or video tools to intimidate or deceive others.

  • Circumvent controls – including removing or altering security mechanisms or metadata, or using workarounds to avoid usage limits.


4. Data Handling

Users are responsible for ensuring that any content they upload, share, or distribute complies with applicable privacy, confidentiality, and data-handling obligations.

Sensitive or classified data must only be uploaded to authorised environments and handled by authorised personnel.

DekkoSecure’s platform uses end-to-end encryption (“zero-knowledge”) meaning only authorised users can access their own data.
DekkoSecure cannot view or modify user content but may restrict or disable access to a user account where required by law or to protect system integrity.


5. Fair Use and Service Utilisation

DekkoSecure’s Services are provided for secure collaboration and information exchange within defined service capacities.

All users, including invited participants and external stakeholders, share responsibility for using the Services efficiently and within reasonable operational limits.

You must avoid unnecessary or excessive activity that may affect your organisation’s or others’ access to the Services — including repeated large transfers, automated retrievals, or high-volume sharing not related to legitimate business use.

DekkoSecure monitors aggregate usage to maintain service quality and may notify customer administrators or restrict certain activities if usage levels indicate abnormal or excessive consumption.

Customers remain responsible for managing their organisation’s overall use of the Services.

DekkoSecure reserves the right to apply technical or administrative controls to prevent service degradation or misuse.


6. Monitoring and Enforcement

DekkoSecure does not inspect encrypted content but may monitor metadata and activity logs for operational, security, and compliance purposes.

We may suspend or terminate access, without notice, if we reasonably believe a user’s actions:

  • Violate this Policy,

  • Compromise system security or stability, or

  • Pose a risk to other users or DekkoSecure’s operations.

Serious or unlawful activity may be referred to appropriate authorities.


7. Reporting Misuse

To report abuse or a suspected violation of this Policy, please contact terms@dekkosecure.com


8. Policy Updates

DekkoSecure may update this Policy periodically to reflect legal, security, or operational changes.

Where practicable, notice of updates will be provided via notification, in-app messages or the DekkoSecure Knowledge Base.

Continued use of the Services after an update constitutes acceptance of the revised Policy.


9. Acknowledgement

By creating an account or using the Services, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy and the DekkoSecure Terms of Service.