Teralo Acceptable Use Policy
Overview
This acceptable use policy covers all products, services, and technologies (collectively, the "Products") provided by Teralo. It's designed to protect Teralo, its customers, and the internet community from unethical, irresponsible, and illegal activity.
Customers found violating this policy may face service suspension and account termination. In extreme cases, Teralo may report violators to relevant authorities.
Last reviewed: January 2026
Fair Use
Teralo provides its facilities assuming "business as usual" usage per the offer schedule. Excessive use may result in additional fees or capacity restrictions.
The company opposes all forms of abuse, discrimination, and rights infringement. Customers and their end-users are expected to use Products with similar ethical intent.
Customer Accountability
Customers are responsible for their own actions and those of anyone using the Products with their permission. This includes unauthorized use resulting from inadequate security measures.
By accepting Products, customers agree to ensure policy adherence by all end-users. Violations by customers or end-users can result in service termination or account suspension without notice.
Prohibited Activities
Copyright Infringement and Unauthorized Material
Products cannot transmit, distribute, or store material violating applicable law, including:
- Material protected by copyright, trademark, or trade secrets without authorization
- Obscene, defamatory, or threatening material
- Material violating export control laws
Customers bear sole responsibility for obtaining legal permission to use all material input into the Products.
SPAM and Unauthorized Messaging
Products cannot be used to send unsolicited bulk or commercial messages. Prohibited activities include:
- Sending spam or soliciting customers from other spam sources
- Running unconfirmed mailing lists or phone number lists
- Subscribing addresses or numbers without owner permission
- Using purchased third-party lists for spam purposes
All messaging lists must use "confirmed opt-in" verification, with proof of express permission maintained throughout the list's lifespan.
Unethical, Exploitative, and Malicious Activity
Products cannot be used to:
- Advertise software designed to violate this or other policies
- Facilitate spam, network sniffing, packet spoofing, flooding, or denial-of-service attacks
- Access accounts or resources without authorization ("hacking," "cracking," etc.)
- Intentionally introduce viruses or malicious code
- Engage in harassment, including denial-of-service attacks, hate speech, or discrimination
Additional prohibited activities include:
- Obtaining services with intent to avoid payment
- Unauthorized access, alteration, or destruction of customer or end-user information
- Interfering with other customers' facility use
- Publishing content that incites violence or depicts child exploitation
- Violating consumer protection laws or privacy rights
Products cannot be used by entities involved in illegal gambling, terrorism, narcotics trafficking, arms trafficking, or development/production of weapons of mass destruction or related materials.
Unauthorized Use of Teralo Property
Impersonating Teralo, misrepresenting business relationships with Teralo, or claiming ownership of Teralo property to fraudulently gain service, custom, or trust is prohibited.
Policy Modifications
Teralo reserves the right to modify this policy by publishing revised versions on its website. Revised versions become effective upon the earlier of:
- Customer use of Products after publication
- 30 days after publication