All Legal Documents

Acceptable Use Policy

Effective date: January 15, 2025

1. Purpose and Scope

This policy governs the authorized use of company-provided Cloud PC resources. It applies to all customers, contractors, and authorized users accessing the environment. The primary goal is to ensure a secure, high-performance environment dedicated to business productivity.

2. Authorized Activities

Cloud PC resources are provided strictly for work-related activities. Users are permitted to use the following services only:

  • Documentation: Creating, editing, and storing business documents using approved applications (e.g., Word, Excel, PDF).
  • Electronic Mail: Professional communication with colleagues, clients, and vendors via approved corporate mail accounts.
  • Professional Browsing: Accessing the internet for research, documentation, and job-specific search engine web applications.

3. Prohibited Activities (Gaming & High-Resource Use)

To preserve system integrity and bandwidth, the following activities are strictly prohibited:

  • Gaming: Downloading, installing, or playing any recreational games (online or local).
  • Unauthorized Software: Installing any programs, scripts, or applications not explicitly prescribed by the IT department.
  • Resource Abuse: Excessive consumption of CPU, memory, or disk space for non-business purposes (e.g., crypto-mining or personal media streaming).
  • Bypassing Controls: Any attempt to circumvent security filters, firewalls, or access restrictions.

4. Proxy & VPN Detection Disclaimer (Liability Exclusion)

The Cloud PC operates from a high-security data centre environment.

  • Third-Party Blocking: Some external websites may automatically identify Cloud PC IP addresses as a "Proxy" or "VPN" connection and deny access.
  • No Provider Liability: The Service Provider is not liable if a third-party website displays messages such as "You are using a proxy" or "Access Denied."
  • External Policy: Such restrictions are imposed by the website owner's security settings. The Service Provider cannot guarantee that every website on the public internet will be accessible via the Cloud PC.

5. Cryptocurrency Activities

Mining, trading bots, or running blockchain nodes that consume excessive compute or network resources are strictly prohibited.

6. Torrenting & Peer-to-Peer (P2P) Sharing

Downloading or distributing content via BitTorrent or any unauthorized P2P protocols is strictly prohibited.