Acceptable Use Policy

Version 1.0 — Effective February 2026

Copyright © 2024–2026 Chasing Our Light, LLC. All rights reserved.


1. Introduction

This Acceptable Use Policy ("AUP") governs the use of the MAGK Tech platform, including all software, services, APIs, network infrastructure, hardware nodes, and related systems (collectively, the "Platform") provided by Chasing Our Light, LLC, operating under the trade name MAGK Tech.

By accessing or using the Platform, you agree to comply with this AUP. This AUP supplements the MAGK Tech Proprietary Software License and the Terms and Conditions.

2. Authorized Use

Users who have been granted an explicit written license may use the Platform only for:

  • Tactical communications and situational awareness operations.
  • Military simulation, training exercises, and emergency response coordination.
  • Administration and management of TAK server infrastructure.
  • Client device onboarding via QR code generation and certificate management.
  • Event planning, mission coordination, and team management.
  • Monitoring system health and performance through provided dashboards.
  • Integration with authorized TAK-compatible client applications (ATAK, iTAK, WinTAK).

3. Prohibited Activities

3.1 Security Violations

Users shall not attempt to gain unauthorized access, probe or scan for vulnerabilities, intercept data transmissions, deploy malware, conduct denial-of-service attacks, or exploit any bug or vulnerability for any purpose other than promptly reporting it to Provider.

3.2 Reverse Engineering and Modification

Users shall not reverse engineer, decompile, disassemble, modify, adapt, create derivative works, remove proprietary notices, or bypass any technical protection measures.

3.3 Unauthorized Data Activities

Users shall not scrape or harvest data, access personal data of other users in violation of privacy laws, use the Platform to store or transmit illegal content, or exfiltrate proprietary data.

3.4 Misuse of Services

Users shall not use the Platform for unintended purposes, resell or commercially exploit access, use it to develop competing products, impersonate any person or entity, or interfere with other users' enjoyment of the Platform.

3.5 Hardware and Node Restrictions

Users shall not tamper with or reverse engineer MAGK hardware nodes, connect unauthorized devices, interfere with HaLow or mesh network communications, or attempt to extract encryption keys or credentials from hardware nodes.

4. Reporting Obligations

Users must promptly report any known or suspected security breaches, vulnerabilities, unauthorized use of credentials, or loss or theft of hardware nodes.

Security incidents should be reported to: security@magktech.com

5. Monitoring and Enforcement

Provider reserves the right to monitor use of the Platform to ensure compliance. Violations may result in warnings, temporary suspension, permanent termination, civil remedies, or referral to law enforcement.

6. Modifications

Provider reserves the right to modify this AUP at any time. Material changes will be communicated to licensed users. Continued use after notification constitutes acceptance.

7. Contact Information

For questions about this Acceptable Use Policy:

Chasing Our Light, LLC
d/b/a MAGK Tech
Email: legal@magktech.com