Introduction
This Acceptable Use Policy ("AUP") governs the use of LinShield, a zero-trust security platform for Linux server management, operated by Jenria Infotech LLP. Our Service is accessible at linshield.com (marketing website) and app.linshield.com (application platform). This policy is designed to protect our users, our infrastructure, and the broader internet community.
By using our Service, you agree to comply with this AUP. Violation of this policy may result in suspension or termination of your account without refund.
LinShield is built on zero-trust security principles. We expect all users to use our platform responsibly and in compliance with all applicable laws.
Permitted Uses
LinShield is designed for legitimate server management and security purposes. Permitted uses include:
- Server Administration: Managing Linux servers that you own, rent, or have explicit authorization to administer
- SSH Key Management: Generating, storing, and deploying SSH keys for authorized server access
- Security Monitoring: Monitoring and auditing server security on systems you are authorized to manage
- Team Collaboration: Providing controlled access to team members who need to manage authorized servers
- DevOps Workflows: Integrating server management into legitimate development and operations processes
- Compliance Management: Implementing security controls and maintaining audit trails for compliance purposes
Prohibited Activities
The following activities are strictly prohibited and may result in immediate account termination and legal action.
Unauthorized Access
- Accessing or attempting to access servers without proper authorization
- Using stolen, borrowed, or otherwise unauthorized credentials
- Bypassing or attempting to bypass security controls on any system
- Scanning, probing, or testing vulnerabilities of systems you do not own or have permission to test
- Brute-forcing or attempting to crack passwords or encryption
Malicious Activities
- Distributing malware, viruses, ransomware, or other malicious software
- Conducting denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
- Operating botnets or participating in botnet activities
- Cryptocurrency mining without authorization from the server owner
- Launching attacks against other systems or networks
Illegal Content and Activities
- Hosting or distributing illegal content of any kind
- Child sexual abuse material (CSAM) - zero tolerance policy
- Content that violates intellectual property rights
- Facilitating fraud, phishing, or identity theft
- Money laundering or other financial crimes
- Activities that violate any applicable laws or regulations
Platform Abuse
- Attempting to reverse engineer, decompile, or disassemble our software
- Circumventing usage limits, license restrictions, or security measures
- Sharing account credentials with unauthorized individuals
- Creating multiple accounts to circumvent restrictions or bans
- Interfering with the operation of our platform or other users' access
- Reselling or redistributing our service without authorization
Spam and Abuse
- Sending unsolicited bulk email (spam)
- Operating open mail relays or open proxies
- Harvesting email addresses or personal information
- Engaging in any form of harassment or abuse
Security Requirements
As a user of LinShield, you are responsible for:
- Account Security: Protecting your login credentials and enabling multi-factor authentication where available
- SSH Key Security: Safeguarding your SSH private keys and immediately revoking any compromised keys
- Access Management: Regularly reviewing and revoking access for team members who no longer require it
- Server Security: Maintaining proper security configurations on your connected servers
- Incident Reporting: Promptly reporting any security incidents or suspected unauthorized access
Resource Usage
To ensure fair access for all users, you agree to:
- Use the service within your subscribed limits
- Not abuse API rate limits or automated access mechanisms
- Not engage in activities that could degrade service performance for others
- Report any bugs or vulnerabilities responsibly through proper channels
Reporting Violations
If you become aware of any violation of this Acceptable Use Policy, please report it immediately:
We take all reports seriously and will investigate promptly. You may report anonymously if preferred.
Enforcement
We reserve the right to investigate suspected violations and take appropriate action, including:
Warning
For minor or first-time violations, we may issue a warning and request remediation.
Suspension
We may temporarily suspend access while investigating violations or until issues are remediated.
Termination
Serious or repeated violations may result in permanent account termination without refund.
Legal Action
We may report illegal activities to appropriate law enforcement authorities and cooperate with investigations.
In cases of severe violations or imminent harm, we may take immediate action without prior notice.
Cooperation with Authorities
We cooperate with law enforcement agencies when required by law or in response to valid legal process. We may disclose user information in connection with:
- Valid court orders and legal subpoenas
- Criminal investigations involving our service
- Emergency situations involving potential harm to individuals
- Protection of our rights and property
Changes to This Policy
We may update this Acceptable Use Policy from time to time to reflect changes in our practices, technologies, legal requirements, or other factors. We will notify you of material changes by posting the new policy on this page and updating the "Last Updated" date. Continued use of our service after changes constitutes acceptance of the modified policy.
Contact Us
If you have any questions about this Acceptable Use Policy, please contact us:
Jenria Infotech LLP
Gujarat, India