Acceptable Use Policy
1. General Principles
You agree to use the Service responsibly and in accordance with all applicable laws. The Service is designed for legitimate server management, monitoring, and incident response purposes.
This Acceptable Use Policy is part of and supplements our Terms of Service. Capitalized terms not defined here have the meanings given in the Terms of Service.
2. Prohibited Uses
Illegal Activities. You must not use the Service to manage, monitor, or support servers engaged in illegal activities, facilitate the distribution of illegal content, or violate any applicable law or regulation.
Harmful Activities. You must not use the Service to:
- Launch or facilitate denial-of-service (DoS/DDoS) attacks
- Distribute malware, ransomware, spyware, or other malicious software
- Engage in cryptocurrency mining without the server owner's explicit authorization
- Host or distribute phishing content
- Send spam or bulk unsolicited communications
Unauthorized Access. You must not attempt to access servers or systems you do not own or are not authorized to manage, use the Service to probe or test vulnerabilities without authorization, circumvent security measures, or share account credentials with unauthorized parties.
Service Abuse. You must not exceed plan limits without payment, create multiple free accounts to circumvent limits, reverse engineer or decompile the Service, use it to build a competing product, or resell access without written authorization.
Content Restrictions. You must not use the Service to manage servers hosting child sexual abuse material (CSAM), content promoting terrorism or violence, or any content that violates human rights.
3. Server Ownership and Authorization
You represent and warrant that you have proper ownership or written authorization for every server connected to the Service.
If we have reasonable grounds to believe a connected server is not owned or authorized by you, we may immediately disconnect it and suspend your account pending verification.
Managed service providers (MSPs) and agencies using the Service on behalf of their clients must have documented authorization from each client.
4. Resource Usage
The Service is intended for managing production, staging, and development servers in normal operational use.
We reserve the right to throttle or restrict accounts that generate excessive API calls, Agent connections, or system load that materially impacts the Service for other users.
If your usage consistently exceeds your plan's limits, we will notify you and offer an appropriate plan upgrade.
5. Security Responsibilities
You are responsible for securing SSH keys, API tokens, and other credentials used with the Service. You must promptly rotate or revoke any credentials that may have been compromised.
You should configure the Agent with the minimum necessary permissions (principle of least privilege) and maintain an appropriate command allow-list.
6. Reporting Violations
If you become aware of any violation of this policy, please report it to abuse@mttrly.com. We investigate all reports and take appropriate action.
7. Enforcement
Violations of this policy may result in:
- A warning with a request to cease the violating activity
- Temporary suspension of your account
- Permanent termination of your account
- Reporting to relevant law enforcement authorities
The severity of enforcement depends on the nature, frequency, and impact of the violation. We may take immediate action without prior warning for severe violations (e.g., illegal activities, security threats, CSAM).
No refunds will be issued for accounts terminated due to policy violations.
8. Changes to This Policy
We may update this policy from time to time. Material changes will be communicated via email or a notice on the Service. Continued use after the effective date constitutes acceptance.