Seldesk Cloud - Acceptable Use Policy

Published on: 21st March 2024

Register / Login / Usage of SELDESK Cloud Services is subject to this Acceptable Use Policy (AUP). This is incorporated by reference into, and governed by the SELDESK Enterprise Subscription Agreement between you ("you","your") and SELDESK. If any Violation of these rules you may see your subscriptions suspended without prior notice and subscription fees will usually not be refunded.

Illegal or Harmful Use

You may not use SELDESK Cloud services for storing, upload, post, email, store, transmit, displaying, distributing or processing illegal and harmful content. This includes:

  • Offensive Content: This refers the Content that is defamatory, obscene, banned contents by law of any country or authorities, threatens, abusive, invasive of privacy including content that constitutes child pornography, relates to bestiality, depicts nonconsensual sex acts.

  • Disruption of network communication or integrity which would include activities such as network monitoring, packet spoofing, forging, flooding, port scanning or attempting denial of service attacks.

  • Illegal Activities: This refers, promoting gambling related sites, services or child pornography.

  • Harmful or Fraudulent Activities: This refers the Activities harmful to others, promoting fraudulent goods, services, schemes, promotions (e.g., make-money-fast schemes, phishing, pharming) or engaging in other deceptive practices.

  • Infringing Content: This refers the Contents that infringes the intellectual property of others, violates third-party rights of any kind.

  • Harmful Content: This refers the Malicious and malware content such as viruses, trojan horses, worms, etc.

  • Harms or interferes with any device, software, network or service that is part of Circuit and its underlying infrastructure.

  • To use the Services, or any interfaces provided with the Services, to access any other SELDESK product or service in a manner that violates the terms of service of such other SELDESK product or service.

Email Abuse

You may not use SELDESK Cloud services for spamming. This includes:

  • Unsolicited messages: sending or facilitating the distribution of unsolicited bulk emails and messages, either directly via SELDESK Cloud or indirectly via third-party email services. This includes the use of bulk emails lists. Any mass-mailing activity is subject to the applicable legal restrictions and you must be able to show evidence of consent for your bulk email distribution lists.

  • Spoofing: sending emails or messages with forged or obfuscated headers.

Security Violations

Upon Registering or Login you agree that you will not attempt to compromise SELDESK Cloud services to access or modify content that does not belong to you.

  • Security research: Conducting any security research or audit on SELDESK Cloud systems without written permission to do so.

  • Unauthorized access: Accessing or using any SELDESK Cloud system or service without permission.

  • Eavesdropping: Listening to or recording data that does not belong to you.

  • All other attacks:Non-technical attacks such as social engineering, phishing, or physical attacks against anyone or any system.

Network and Services Abuse

Upon Registering or Login You agree that you will not abuse the resources and systems of SELDESK Cloud. In particular the following activities are prohibited:

  • Attacking Third party systems: using SELDESK Cloud services to attack, crawl and impact the availability or security of third-party systems.

  • Abusive registrations: using automated tools to repeatedly register or subscribe to SELDESK Cloud services, or registering or subscribing with fake credentials, or under the name of someone else without their permission.

  • Network abuse: Causing Denial of Service (DoS) by flooding systems with network traffic that slows down the system which makes it unreachable or significantly impacts the quality of service.

  • Unthrottled RPC/API calls: Sending large numbers of RPC or remote API calls to our systems without appropriate throttling.

  • Overloading: Voluntarily impacting the performance or availability of systems with abnormal content such as very large data quantities or very large numbers of elements to process.

  • Crawling: You will not use any Automatically crawling resources in a way impacting the availability and performance of the systems.