dns Linux RMM
  • Features
  • How It Works
Sign In Start Free

Acceptable Use Policy

Last updated: February 2025

This Acceptable Use Policy ("AUP") governs your use of the Linux RMM service provided by Brindleford Technologies Ltd. This AUP is incorporated into and forms part of our Terms and Conditions.

1. Purpose

Linux RMM is designed to help IT professionals, managed service providers (MSPs), and system administrators monitor and manage Linux servers they own or have explicit authorisation to manage. This policy ensures our service is used responsibly and legally.

2. Authorised Use

You may use the Service only for:

  • Monitoring and managing servers and systems you own
  • Monitoring and managing systems where you have written authorisation from the owner
  • Executing scripts and commands you have tested and verified
  • Storing credentials for systems you are authorised to access
  • Creating and managing automation tasks for authorised systems

3. Prohibited Activities

You must not use the Service to:

3.1 Unauthorised Access

  • Access, monitor, or manage any system without proper authorisation
  • Attempt to gain access to systems, accounts, or data you are not entitled to
  • Install the Agent on systems without the owner's explicit consent
  • Use the Service for penetration testing without written permission from system owners

3.2 Malicious Activities

  • Distribute malware, viruses, trojans, ransomware, or other malicious software
  • Launch denial of service (DoS) or distributed denial of service (DDoS) attacks
  • Deploy cryptocurrency miners without system owners' knowledge
  • Engage in any form of hacking, cracking, or exploitation
  • Create botnets or command-and-control infrastructure

3.3 Illegal Content and Activities

  • Store, transmit, or process illegal content
  • Facilitate illegal activities or transactions
  • Violate any applicable laws, regulations, or third-party rights
  • Infringe intellectual property rights
  • Engage in fraud, phishing, or identity theft

3.4 Harmful Behaviour

  • Intentionally damage, disable, or impair systems
  • Delete or corrupt data without authorisation
  • Execute commands that could cause system instability
  • Interfere with other users' access to the Service
  • Overload the Service through excessive API calls or data transfers

3.5 Privacy Violations

  • Collect personal data without proper consent and legal basis
  • Monitor employee activity without required legal notifications
  • Access or exfiltrate personal data unlawfully
  • Fail to implement appropriate data protection measures

3.6 Service Abuse

  • Resell or redistribute the Service without our written consent
  • Share account credentials with unauthorised individuals
  • Circumvent usage limits or billing mechanisms
  • Reverse engineer or decompile the Service
  • Use automated means to access the Service beyond provided APIs

4. Security Requirements

You must:

  • Use strong, unique passwords for your account
  • Enable multi-factor authentication where available
  • Keep the Agent software updated to the latest version
  • Secure credentials stored in the vault with appropriate access controls
  • Review and audit access permissions regularly
  • Report any security vulnerabilities to us immediately
  • Notify us promptly of any suspected unauthorised access

5. MSP and Multi-Tenant Usage

If you are a Managed Service Provider or manage systems for multiple clients:

  • You must have written agreements with each client authorising your management
  • Client data must be segregated appropriately
  • You must implement access controls limiting staff to relevant clients
  • You must maintain audit trails of actions performed on client systems
  • You are responsible for ensuring your clients' compliance with this AUP

6. Script and Automation Guidelines

When executing scripts or automated tasks:

  • Test all scripts in a non-production environment first
  • Document the purpose and expected behaviour of each script
  • Implement appropriate error handling and rollback mechanisms
  • Avoid hardcoding credentials in scripts (use the secure vault)
  • Review scripts from third parties before execution
  • Do not execute scripts that could damage systems or data

7. Resource Limits

To ensure fair access for all users:

  • API requests are rate-limited per your subscription plan
  • Data retention is limited according to your subscription tier
  • Concurrent connections may be limited during peak periods
  • Large data transfers may be throttled to maintain service quality

If you require higher limits, please contact us to discuss enterprise options.

8. Monitoring and Enforcement

8.1 Our Rights

We reserve the right to:

  • Monitor usage patterns for security and policy compliance
  • Investigate suspected violations of this AUP
  • Remove or disable content that violates this AUP
  • Suspend or terminate accounts for AUP violations
  • Report illegal activities to appropriate authorities

8.2 Violation Consequences

Violations of this AUP may result in:

  • Warning and request for immediate corrective action
  • Temporary suspension of Service access
  • Permanent termination of your account
  • Removal of content from our systems
  • Legal action where appropriate
  • Reporting to law enforcement agencies

8.3 Appeal Process

If you believe action was taken against your account in error, you may appeal by contacting us at abuse@linuxrmm.io within 14 days. Include relevant information supporting your case.

9. Reporting Violations

If you become aware of any violation of this AUP, please report it immediately:

Email: abuse@linuxrmm.io

Please include:

  • Description of the suspected violation
  • Date and time of occurrence (if known)
  • Any relevant evidence or documentation
  • Your contact information for follow-up

10. Changes to This Policy

We may update this AUP to address new features, technologies, or legal requirements. Material changes will be notified via email or through the Service. Continued use after changes indicates acceptance of the updated policy.

11. Contact Information

For questions about this Acceptable Use Policy:

Brindleford Technologies Ltd

71–75 Shelton Street

Covent Garden

London, WC2H 9JQ

United Kingdom

Email: legal@linuxrmm.io

dns Linux RMM

Remote Monitoring & Management for Linux

Brindleford Technologies Ltd

71–75 Shelton Street
Covent Garden
London, WC2H 9JQ

Registered in England & Wales
Company Number: 16871436

Product
  • Features
  • How It Works
  • Start Free
  • Sign In
Legal
  • Privacy Policy
  • Terms & Conditions
  • Acceptable Use Policy
  • Cookie Policy
  • Data Processing Agreement
  • Service Level Agreement
Contact
  • support@linuxrmm.io

© 2025 Brindleford Technologies Ltd. All rights reserved.

Linux RMM is a trading name of Brindleford Technologies Ltd