Acceptable Use Policy
Last Updated: January 21, 2026
Purpose: This policy defines acceptable and prohibited uses of Vellunox remote access and IT management services. It protects our users, our infrastructure, and ensures compliance with applicable laws.
1. Overview
This Acceptable Use Policy ("AUP") applies to all users of Vellunox Technologies LLC services, including remote access, RMM (Remote Monitoring and Management), Work From Home portals, and related services.
Violation of this AUP may result in immediate suspension or termination of services.
2. Acceptable Use
You MAY Use Our Services To:
- Remotely access computers you own or are authorized to manage
- Provide IT support to your employees and clients with their consent
- Monitor and manage systems under your authorized control
- Deploy software and updates to authorized endpoints
- Access your work computer from home (Work From Home service)
- Provide technical support during authorized sessions
- Maintain security and compliance of your IT infrastructure
3. Prohibited Use
You May NOT Use Our Services To:
- Unauthorized Access: Access any computer or system without explicit authorization
- Illegal Activities: Engage in any activity that violates local, state, federal, or international law
- Malware Distribution: Deploy viruses, ransomware, spyware, or any malicious software
- Harassment: Stalk, harass, or intimidate any person
- Privacy Violations: Intercept communications or data without consent
- Fraud: Engage in phishing, identity theft, or financial fraud
- Abuse: Overload, attack, or disrupt our services or other users
- Circumvention: Bypass security measures, authentication, or access controls
- Resale: Resell or redistribute our services without authorization
- Impersonation: Misrepresent your identity or authority
4. Remote Access Specific Rules
4.1 Authorization Requirements
Before initiating any remote session, you must have:
- Written or verbal authorization from the system owner
- Clear understanding of the scope of authorized access
- User consent for any attended sessions
4.2 Session Conduct
- Only access areas necessary for the authorized task
- Do not access personal files without explicit permission
- End sessions promptly when the task is complete
- Do not share session access with unauthorized parties
5. Security Requirements
All users must:
- Use strong, unique passwords
- Enable two-factor authentication (2FA)
- Keep client software updated
- Use antivirus/antimalware protection
- Report security incidents within 24 hours
6. Enforcement
Violations may result in:
- Warning: First-time minor violations
- Suspension: Repeated or moderate violations
- Termination: Serious violations or illegal activity
- Legal Action: Criminal referral for illegal activities
7. Legal Compliance
Users must comply with all applicable laws, including:
- Computer Fraud and Abuse Act (CFAA)
- Electronic Communications Privacy Act (ECPA)
- HIPAA (for healthcare data)
- PCI DSS (for payment card data)
- GDPR (for EU personal data)
Contact Us
For questions about this policy:
Email: legal@vellunox.com
Report Abuse: abuse@vellunox.com