Acceptable Use Policy
Last updated: February 2025
This Acceptable Use Policy ("AUP") governs your use of the Linux RMM service provided by Brindleford Technologies Ltd. This AUP is incorporated into and forms part of our Terms and Conditions.
1. Purpose
Linux RMM is designed to help IT professionals, managed service providers (MSPs), and system administrators monitor and manage Linux servers they own or have explicit authorisation to manage. This policy ensures our service is used responsibly and legally.
2. Authorised Use
You may use the Service only for:
- Monitoring and managing servers and systems you own
- Monitoring and managing systems where you have written authorisation from the owner
- Executing scripts and commands you have tested and verified
- Storing credentials for systems you are authorised to access
- Creating and managing automation tasks for authorised systems
3. Prohibited Activities
You must not use the Service to:
3.1 Unauthorised Access
- Access, monitor, or manage any system without proper authorisation
- Attempt to gain access to systems, accounts, or data you are not entitled to
- Install the Agent on systems without the owner's explicit consent
- Use the Service for penetration testing without written permission from system owners
3.2 Malicious Activities
- Distribute malware, viruses, trojans, ransomware, or other malicious software
- Launch denial of service (DoS) or distributed denial of service (DDoS) attacks
- Deploy cryptocurrency miners without system owners' knowledge
- Engage in any form of hacking, cracking, or exploitation
- Create botnets or command-and-control infrastructure
3.3 Illegal Content and Activities
- Store, transmit, or process illegal content
- Facilitate illegal activities or transactions
- Violate any applicable laws, regulations, or third-party rights
- Infringe intellectual property rights
- Engage in fraud, phishing, or identity theft
3.4 Harmful Behaviour
- Intentionally damage, disable, or impair systems
- Delete or corrupt data without authorisation
- Execute commands that could cause system instability
- Interfere with other users' access to the Service
- Overload the Service through excessive API calls or data transfers
3.5 Privacy Violations
- Collect personal data without proper consent and legal basis
- Monitor employee activity without required legal notifications
- Access or exfiltrate personal data unlawfully
- Fail to implement appropriate data protection measures
3.6 Service Abuse
- Resell or redistribute the Service without our written consent
- Share account credentials with unauthorised individuals
- Circumvent usage limits or billing mechanisms
- Reverse engineer or decompile the Service
- Use automated means to access the Service beyond provided APIs
4. Security Requirements
You must:
- Use strong, unique passwords for your account
- Enable multi-factor authentication where available
- Keep the Agent software updated to the latest version
- Secure credentials stored in the vault with appropriate access controls
- Review and audit access permissions regularly
- Report any security vulnerabilities to us immediately
- Notify us promptly of any suspected unauthorised access
5. MSP and Multi-Tenant Usage
If you are a Managed Service Provider or manage systems for multiple clients:
- You must have written agreements with each client authorising your management
- Client data must be segregated appropriately
- You must implement access controls limiting staff to relevant clients
- You must maintain audit trails of actions performed on client systems
- You are responsible for ensuring your clients' compliance with this AUP
6. Script and Automation Guidelines
When executing scripts or automated tasks:
- Test all scripts in a non-production environment first
- Document the purpose and expected behaviour of each script
- Implement appropriate error handling and rollback mechanisms
- Avoid hardcoding credentials in scripts (use the secure vault)
- Review scripts from third parties before execution
- Do not execute scripts that could damage systems or data
7. Resource Limits
To ensure fair access for all users:
- API requests are rate-limited per your subscription plan
- Data retention is limited according to your subscription tier
- Concurrent connections may be limited during peak periods
- Large data transfers may be throttled to maintain service quality
If you require higher limits, please contact us to discuss enterprise options.
8. Monitoring and Enforcement
8.1 Our Rights
We reserve the right to:
- Monitor usage patterns for security and policy compliance
- Investigate suspected violations of this AUP
- Remove or disable content that violates this AUP
- Suspend or terminate accounts for AUP violations
- Report illegal activities to appropriate authorities
8.2 Violation Consequences
Violations of this AUP may result in:
- Warning and request for immediate corrective action
- Temporary suspension of Service access
- Permanent termination of your account
- Removal of content from our systems
- Legal action where appropriate
- Reporting to law enforcement agencies
8.3 Appeal Process
If you believe action was taken against your account in error, you may appeal by contacting us at [email protected] within 14 days. Include relevant information supporting your case.
9. Reporting Violations
If you become aware of any violation of this AUP, please report it immediately:
Please include:
- Description of the suspected violation
- Date and time of occurrence (if known)
- Any relevant evidence or documentation
- Your contact information for follow-up
10. Changes to This Policy
We may update this AUP to address new features, technologies, or legal requirements. Material changes will be notified via email or through the Service. Continued use after changes indicates acceptance of the updated policy.
11. Contact Information
For questions about this Acceptable Use Policy: