This policy governs the authorized use of company-provided Cloud PC resources. It applies to all customers, contractors, and authorized users accessing the environment. The primary goal is to ensure a secure, high-performance environment dedicated to business productivity.
2. Authorized Activities
Cloud PC resources are provided strictly for work-related activities. Users are permitted to use the following services only:
Documentation: Creating, editing, and storing business documents using approved applications (e.g., Word, Excel, PDF).
Electronic Mail: Professional communication with colleagues, clients, and vendors via approved corporate mail accounts.
Professional Browsing: Accessing the internet for research, documentation, and job-specific search engine web applications.
The Cloud PC operates from a high-security data centre environment.
Third-Party Blocking: Some external websites may automatically identify Cloud PC IP addresses as a "Proxy" or "VPN" connection and deny access.
No Provider Liability: The Service Provider is not liable if a third-party website displays messages such as "You are using a proxy" or "Access Denied."
External Policy: Such restrictions are imposed by the website owner's security settings. The Service Provider cannot guarantee that every website on the public internet will be accessible via the Cloud PC.
5. Cryptocurrency Activities
Mining, trading bots, or running blockchain nodes that consume excessive compute or network resources are strictly prohibited.
6. Torrenting & Peer-to-Peer (P2P) Sharing
Downloading or distributing content via BitTorrent or any unauthorized P2P protocols is strictly prohibited.