Acceptable Use Policy
Effective Date: February 1, 2025
1. Introduction
This Acceptable Use Policy ("AUP") governs your use of the Rediacc infrastructure automation platform and related services. This AUP is incorporated into and forms part of our Terms of Service. By using our Services, you agree to comply with this policy.
2. Prohibited Activities
You may not use the Rediacc platform to:
- Engage in cryptocurrency mining, blockchain validation, or similar computationally intensive activities unrelated to your legitimate use of the platform
- Send unsolicited bulk communications (spam), phishing emails, or malicious content
- Host, distribute, or link to malware, viruses, ransomware, or other malicious software
- Conduct network attacks, including denial-of-service (DoS/DDoS) attacks, port scanning, or traffic flooding, against any target
- Access or attempt to access accounts, systems, or data that do not belong to you without explicit authorization
- Circumvent, disable, or interfere with security features, rate limits, or access controls of the platform
- Store, process, or transmit content that violates applicable laws, including but not limited to child exploitation material, content promoting terrorism, or content that infringes intellectual property rights
- Resell, sublicense, or redistribute access to the platform without written authorization from Rediacc
- Use the platform to build a competing product or service, or to benchmark the platform for competitive purposes without written consent
3. Resource Usage
The Rediacc platform operates on shared and dedicated infrastructure. To ensure fair access for all users:
- You must use platform resources (CPU, memory, storage, network) in accordance with your subscription tier limits
- Automated processes (scripts, bots, CI/CD pipelines) must not create excessive load that degrades service for other users
- Storage usage must reflect legitimate platform use; using the platform solely for bulk data storage unrelated to your environments is prohibited
- You must promptly address any resource usage issues identified and communicated by Rediacc
4. Security Requirements
You are responsible for the security of your account and environments:
- Use strong, unique passwords and enable multi-factor authentication when available
- Do not share account credentials between individuals; use team features for multi-user access
- Report any security vulnerabilities you discover to [email protected] promptly
- Do not attempt to probe, scan, or test the vulnerability of the platform or breach security measures without explicit written authorization from Rediacc
- Maintain up-to-date software and configurations in your environments to prevent security risks
5. Content Standards
Content stored, processed, or transmitted through the platform must comply with applicable laws and regulations. You are solely responsible for the content in your environments. Rediacc does not actively monitor content but reserves the right to review content when we have reason to believe a violation has occurred.
6. Enforcement
Violation of this AUP may result in one or more of the following actions, at our sole discretion:
- A written warning identifying the violation and requesting remediation
- Temporary suspension of your access to the platform
- Throttling or restricting specific platform features or resources
- Permanent termination of your account
- Reporting to appropriate law enforcement authorities
We will make reasonable efforts to notify you before taking action, except where immediate action is necessary to protect the platform, other users, or comply with legal requirements.
7. Reporting Violations
If you believe a Rediacc user is violating this AUP, please report it to [email protected] with as much detail as possible. We take all reports seriously and will investigate promptly.
8. Changes to This Policy
We may update this AUP from time to time to address new threats, technologies, or platform features. Changes will be posted on this page with an updated effective date. Continued use of the Services after changes constitutes acceptance of the updated policy.
Questions?
If you have questions about this Acceptable Use Policy, contact us at [email protected].