Legal

Acceptable Use Policy

This policy defines lawful and responsible use requirements for cloud connectivity software, secure access workflows, and related service operations.

Customers must use the service for lawful account security, application connectivity, remote team access, and managed service delivery purposes only.

Permitted use

Permitted use includes lawful remote team access, account security, application connectivity, secure data-in-transit needs, and general network reliability across supported routes.

Customers remain responsible for complying with local law, third-party rules, sanctions and export controls, and all applicable account policies.

The service is not intended for activity that violates hosting provider rules, payment provider requirements, or third-party service policies.

Prohibited use

Prohibited use includes spam, phishing, scams, impersonation, credential theft, malware, botnets, cryptojacking, distributed attacks, port scanning, vulnerability exploitation, brute force, harassment, fraud, illegal access, sanctions violations, copyright infringement, unauthorized resale, and abuse of third-party services.

We may suspend, limit, or terminate access when credible evidence of prohibited use is received or detected.

Enforcement

Enforcement may include warning, rate or access limitation, account review, suspension, termination, preservation of relevant records, or cooperation with lawful requests.

Questions about acceptable use may be sent to [email protected].