Acceptable Use Policy (AUP)
1. Introduction and Acceptance
This Acceptable Use Policy (AUP) outlines the acceptable use of the Bolt Logic network, systems, and services (collectively, the "Services") by our customers and users (collectively, "Users"). By using the Services, the User agrees to be bound by the terms of this AUP. Bolt Logic reserves the right to modify this AUP at any time, effective upon posting the revised AUP on the Bolt Logic website. The User is responsible for ensuring their use of the Services complies with the most current AUP.
2. General Prohibitions
Users must not use the Services to transmit, distribute, or store any material or content that:
- Violates any applicable local, state, national, or international law or regulation.
- Is defamatory, fraudulent, or harassing.
- Is harmful, abusive, hateful, or discriminatory (based on race, ethnicity, religion, gender, sexual orientation, disability, etc.).
- Is obscene, indecent, or contains child pornography.
- Violates the intellectual property rights of others, including copyrights, trademarks, and trade secrets (e.g., unauthorized distribution of copyrighted material).
- Promotes or facilitates illegal acts such as gambling, drug use, or violence.
3. System and Network Security
Users are prohibited from violating or attempting to violate the security of the Bolt Logic network or any third-party network, including:
- Unauthorized Access: Accessing or attempting to access data, servers, or accounts for which the User is not expressly authorized.
- Interference: Attempting to interfere with service to any user, host, or network, including, without limitation, via means of overloading, "flooding," "mailbombing," or "crashing."
- Malicious Code: Distributing, sending, or storing viruses, worms, malware, trojan horses, or any other code intended to disrupt, damage, or limit the functionality of any software, hardware, or telecommunications equipment.
- Probing/Scanning: Conducting network security testing, penetration testing, or vulnerability scanning of the Bolt Logic network or any other network without explicit, written prior authorization from Bolt Logic and the respective network owner.
- Bypassing Controls: Circumventing any authentication, security, or access controls of the Services or any other network.
4. Email and Unsolicited Communications
Users may not use the Services to send, distribute, or facilitate:
- Spam: Unsolicited Bulk Email (UBE) or Unsolicited Commercial Email (UCE). This includes sending emails to recipients who have not explicitly requested to receive messages from the User.
- Email Harvesting: Collecting or accumulating email addresses from the Internet for the purpose of sending unsolicited email.
- Fraudulent Mail: Creating or using fake or misleading headers, forged addresses, or attempting to mask the origin of any electronic mail.
- Opt-out Abuse: Continuing to send email to a recipient who has indicated they wish to stop receiving it.
Bolt Logic reserves the right to terminate any account found to be engaging in or facilitating spam without prior warning.
5. Resource Usage and Performance
Users are required to utilize the Services in a responsible manner and must not:
- Overload Resources: Use excessive network bandwidth, CPU resources, or disk I/O to the detriment of other Bolt Logic Users or the overall network performance.
- Cryptocurrency Mining (General Exception): Unless explicitly approved by Bolt Logic in a dedicated package, using the Services for any form of cryptocurrency mining is strictly prohibited due to the intensive resource demands.
- Resource Exhaustion: Execute long-running, non-interactive processes, or processes that are left running unattended and consume significant resources.
6. High-Risk Activities and Specific Prohibitions
The Services may NOT be used for:
- Denial-of-Service (DoS) Attacks: Initiating or facilitating a Denial of Service attack against any server, network, or third party.
- Phishing/Scamming: Hosting or promoting websites or content designed to impersonate another entity or fraudulently obtain personal information (phishing).
- IRC/Chat Bots: Running public-facing Internet Relay Chat (IRC) servers or chat bots that are vulnerable to abuse or excessive resource consumption.
- Illegal Warez/Piracy: Hosting or linking to software, music, videos, or other media in violation of copyright law ("warez") or acting as a public file mirror for copyrighted material.
- High-Risk Systems: Hosting or providing a service that requires uninterrupted operation and where a service failure could lead to death, personal injury, or catastrophic property damage (e.g., operation of nuclear facilities, air traffic control, life support systems).
7. Cooperation with Authorities
Bolt Logic will cooperate with law enforcement and regulatory agencies in investigating alleged violations of this AUP or any law. Users agree that Bolt Logic may disclose any information concerning the User's use of the Services, including content, when required by law or necessary to enforce this AUP.
8. Enforcement and Violation
Bolt Logic reserves the right, but does not assume the obligation, to investigate any suspected violation of this AUP. AUP violations may result in one or more of the following actions, at the sole discretion of Bolt Logic:
- Warning: A written or verbal warning.
- Service Suspension: Temporary suspension of the User's Service.
- Service Termination: Immediate and permanent termination of the User's Service without refund.
- Cleanup Fee: Charging the User for administrative costs and/or fees for clean-up and repair efforts.
Users are responsible for the actions of their own customers, employees, or agents ("End Users"). If an End User violates this AUP, the Bolt Logic User is responsible for correcting the violation. Bolt Logic may take direct action against the End User or the Bolt Logic User to resolve the violation.
9. Reporting Violations
To report a violation of this AUP, please contact the Bolt Logic Abuse Team at admin@boltlogic.co.uk or submit a ticket through the client portal.