Jordan:
I'd be much more supportive of the typical "donate x to have a relay hosted for you" [1][2] rather than "host a relay with us" without maintaining them under the same family.
If relays are running on his machines and he has access to relay keys,
Not necessarily, it depends on what keys. You can run a relay on infrastructure, without exposing the relay's ed25519 identity keys to that infrastructure (and therefore the hoster)
https://trac.torproject.org/projects/tor/wiki/doc/TorRelaySecurity/OfflineKe...