Teralo Acceptable Use Policy

Overview

This acceptable use policy covers all products, services, and technologies (collectively, the "Products") provided by Teralo. It's designed to protect Teralo, its customers, and the internet community from unethical, irresponsible, and illegal activity.

Customers found violating this policy may face service suspension and account termination. In extreme cases, Teralo may report violators to relevant authorities.

Last reviewed: January 2026

Fair Use

Teralo provides its facilities assuming "business as usual" usage per the offer schedule. Excessive use may result in additional fees or capacity restrictions.

The company opposes all forms of abuse, discrimination, and rights infringement. Customers and their end-users are expected to use Products with similar ethical intent.

Customer Accountability

Customers are responsible for their own actions and those of anyone using the Products with their permission. This includes unauthorized use resulting from inadequate security measures.

By accepting Products, customers agree to ensure policy adherence by all end-users. Violations by customers or end-users can result in service termination or account suspension without notice.

Prohibited Activities

Copyright Infringement and Unauthorized Material

Products cannot transmit, distribute, or store material violating applicable law, including:

  • Material protected by copyright, trademark, or trade secrets without authorization
  • Obscene, defamatory, or threatening material
  • Material violating export control laws

Customers bear sole responsibility for obtaining legal permission to use all material input into the Products.

SPAM and Unauthorized Messaging

Products cannot be used to send unsolicited bulk or commercial messages. Prohibited activities include:

  • Sending spam or soliciting customers from other spam sources
  • Running unconfirmed mailing lists or phone number lists
  • Subscribing addresses or numbers without owner permission
  • Using purchased third-party lists for spam purposes

All messaging lists must use "confirmed opt-in" verification, with proof of express permission maintained throughout the list's lifespan.

Unethical, Exploitative, and Malicious Activity

Products cannot be used to:

  • Advertise software designed to violate this or other policies
  • Facilitate spam, network sniffing, packet spoofing, flooding, or denial-of-service attacks
  • Access accounts or resources without authorization ("hacking," "cracking," etc.)
  • Intentionally introduce viruses or malicious code
  • Engage in harassment, including denial-of-service attacks, hate speech, or discrimination

Additional prohibited activities include:

  • Obtaining services with intent to avoid payment
  • Unauthorized access, alteration, or destruction of customer or end-user information
  • Interfering with other customers' facility use
  • Publishing content that incites violence or depicts child exploitation
  • Violating consumer protection laws or privacy rights

Products cannot be used by entities involved in illegal gambling, terrorism, narcotics trafficking, arms trafficking, or development/production of weapons of mass destruction or related materials.

Unauthorized Use of Teralo Property

Impersonating Teralo, misrepresenting business relationships with Teralo, or claiming ownership of Teralo property to fraudulently gain service, custom, or trust is prohibited.

Policy Modifications

Teralo reserves the right to modify this policy by publishing revised versions on its website. Revised versions become effective upon the earlier of:

  • Customer use of Products after publication
  • 30 days after publication