Acceptable Use Policy.
Rules governing appropriate use of TruPoint's managed services, private cloud infrastructure, and platforms.
1. Purpose
This Acceptable Use Policy ("AUP") governs your use of TruPoint Technology managed services, private cloud infrastructure, ISMS platform, and associated systems. By using TruPoint services, you agree to this AUP.
2. Prohibited activities
You may not use TruPoint services to:
- Violate any applicable federal, provincial, or international law or regulation
- Transmit, distribute, or store malicious code, spam, or unsolicited communications
- Attempt unauthorized access to any system, network, or account
- Conduct denial-of-service attacks or penetration testing without written authorization
- Infringe intellectual property, privacy, or other rights of any person
- Host content that is defamatory, harassing, or facilitates illegal activity
- Mine cryptocurrency or run unauthorized compute workloads
- Circumvent security controls or monitoring systems
3. Security responsibilities
You are responsible for: maintaining the security of your credentials, promptly reporting security incidents to TruPoint, ensuring authorized users comply with this AUP, and maintaining current contact information for security notifications.
4. Monitoring
TruPoint may monitor network traffic, system logs, and activity on its infrastructure for security and compliance purposes. This monitoring is disclosed to clients in the Data Processing Addendum.
5. Enforcement
TruPoint may suspend or terminate access for AUP violations, with or without notice, depending on severity. We will cooperate with law enforcement investigations as required by law.
6. Reporting
To report AUP violations or security incidents: security@trupoint.com
7. Updates
This AUP may be updated at any time. Continued use of TruPoint services after notice constitutes acceptance.