Acceptable Use Policy (AUP)
Last updated: June 27, 2024
We host a wide variety of mission critical projects from all over the world. With the power of the computational resources we provide, we find it important that our clients and hosts act in good faith. While using the Service, you must comply with our Acceptable Use Policies, which include restrictions on conduct on TensorDock related to user safety, intellectual property, privacy, authenticity, and other limitations. In short, be excellent to others.
Capitalized terms used but not defined in these Acceptable Use Policies have the meanings assigned to them in your main agreements with us — the TensorDock Terms of Service and the TensorDock Privacy Policy. This Acceptable Use Policy (this “AUP”) outlines the materials and activities prohibited in association with a Customer's utilization of TensorDock Services. "You" and "your" refer to "Clients" and "Hosts". "We", "us", and "our" refer to "TensorDock".
1. Compliance with Laws and Regulations
You are responsible for using the Service in compliance with all applicable laws, regulations, and all of our Acceptable Use Policies. These policies may be updated from time to time and are provided below.
2. User Safety
We do not allow data or activity on TensorDock that is unlawful or promotes unlawful activities. Examples include but are not limited to data or activity that
relates to sexual exploitation or abuse of minors (“child pornography”)
depicts nudity or sexual activity obtained or disseminated without the consent of those depicted (“revenge/nonconsensual pornography”)
is libelous, defamatory, or fraudulent;
is discriminatory or abusive toward any individual or group;
Is promoting, buying, selling, or distributing illegal substances
is false, inaccurate, or intentionally deceptive information and likely to adversely affect the public interest (including health, safety, election integrity, and civic participation);
harasses or abuses another individual or group, including our employees, officers, and agents, or other users;
threatens or incites violence toward any individual or group, especially based on who they are;
gratuitously depicts or glorifies violence, including violent images; or
interacts with platform features in a way that significantly or repeatedly disrupts the experience of other users.
You must not engage in activity that significantly harms other users. We will interpret our policies and resolve disputes in favor of protecting users as a whole, both Clients and Hosts.
3. Intellectual Property, Authenticity, and Private Information
We do not allow data or activity on TensorDock that:
infringes any proprietary right of any party, including patent, trademark, trade secret, copyright, right of publicity, or other right;
impersonates any person or entity, including any of our employees or representatives, including through false association with TensorDock, or by fraudulently misrepresenting your identity or site's purpose; or
violates the privacy of any third party, such as by posting another person's personal information without consent.
4. Spam and Inauthentic Activity
We do not allow data or activity on TensorDock that is:
automated excessive bulk activity and coordinated inauthentic activity, such as
spamming (unsolicited advertising)
cryptocurrency mining, without our express written permission;
bulk distribution of promotions and advertising;
inauthentic interactions, such as fake accounts and automated inauthentic activity;
creation of or participation in secondary markets for the purpose of the proliferation of inauthentic activity;
using TensorDock as a platform for propagating abuse on other platforms;
using our servers for any form of excessive automated bulk activity to place undue burden on our infrastructure through automated means, as determined by us in our sole discretion;
collection of personal information through deceitful means, such as phishing, Internet scamming, password robbery, spidering, and harvesting; or
offering or disseminating fraudulent goods, services, schemes, or promotions, such as get-rich-quick, pyramid, or Ponzi schemes
5. Site Access and Safety
We do not allow data, technology, software, or activity on TensorDock that may attempt to disrupt any service, device, data, account, or network (defined as “Systems”)
Examples include but are not limited to
Viruses, malware, ransomware, spyware, adware, Trojan horses, worms, or time bombs with no implicit or explicit dual-use purpose
Gaining unauthorized access to any Systems, whether owned by TensorDock, a host, or a third party.
Intercepting or monitoring a System’s data or traffic without permission.
Using misleading TCP-IP email headers, packet headers, or any component of a message to falsify its origin or route, excluding the use of aliases and anonymous remailers.
6. Network Abuse (Clients Only)
The Service's network limitations vary based on the Host whose server you are renting. If we determine your bandwidth usage to be significantly excessive in relation to other users of similar features, we reserve the right to suspend your account, throttle your internet, or otherwise limit your activity until you can reduce your bandwidth consumption. We reserve the right to delete servers that we determine to be placing undue strain on the infrastructure of us or our hosts, after providing advance notice
Additionally, we prohibit:
Monitoring, crawling, or scraping any System, including TensorDock Services.
Interfering with a System, including deliberate attempt of mail bombing, news bombing, broadcast attacks, flooding techniques, or denial of service attacks.
Running open proxies, open mail relays, open recursive domain name servers, Tor exit nodes, or other similar network services.
Bypassing any System’s limitations, such as access limits or storage restrictions.
Instigating retaliation, such as a denial of service attack, against TensorDock, including its Services, employees, or other agents.
Misrepresenting or concealing identity, including the omission, deletion, forgery, or misreporting of identification information, such as return mailing and IP addresses.
7. Privacy
Don't use our Services to post other people's personal information. This includes:
Personal, private email addresses
Phone numbers
Physical addresses or other private location information
Bank account information or credit card numbers
Social Security/National Identity numbers
Passwords
Voter information
Medical information and personal biometric data
Other private information that may pose a safety or security risk
We may consider other information, such as photos or videos that were taken or distributed without the subject's consent, to be an invasion of privacy, especially when such material presents a safety risk to the subject, such as in the case of intimidation or harassment.
TensorDock will take context into account as well as whether the reported content is publicly available elsewhere. However, please note that while sharing publicly available content may not be a violation of this policy, we may still consider it a violation if the information is shared with the intent to harass or incite other abusive behavior.
8. Services Usage Limits
You may not reproduce, duplicate, copy, sell, resell, or exploit any portion of our Services, use of our Services, or access to our Services without our express written permission.
9. Security Vulnerability Testing
Users may not attempt to test the vulnerability of a TensorDock system or network, breach TensorDock security or authentication measures, or conduct security or malware research on or using TensorDock Services, without TensorDock’s express written permission.
10. Enforcement
TensorDock retains full discretion to take action in response to a suspected violation of these policies, including account suspension, account termination, or removal of data, regardless of whether the violation was unintentional or committed without the user’s permission. TensorDock reserves the right to intercept or prevent any data or traffic associated with a Client or its end users if TensorDock Services are being used in violation of this AUP.
We reserve the right, but have no obligation, to investigate violations of this AUP. Nothing in this AUP can be construed as an obligation for TensorDock to act at any given time or with respect to any given instance, and we retain the discretion to exercise this right at any time we see fit.
TensorDock may report, by disclosing, examining, and safeguarding relevant customer data in compliance with applicable laws any potentially unlawful activity or violations of this AUP to law enforcement authorities or third parties. We may report any activity we suspect violates our AUP, the law, or regulations to appropriate law enforcement officials or third parties and cooperate with them in providing related information.
10. Reporting AUP Violations
If a user is aware of any possible violations of the AUP, the user can contact TensorDock at support@tensordock.com with a full explanation of the violations.
11. Appeals
If you believe that a decision regarding a violation of our Acceptable Use Policy has been made in error or unfairly, please don't hesitate to reach out to us for an appeal. We're here to assist you in resolving any concerns you may have. Legitimate reinstatement requests will be reviewed by TensorDock staff and answered with a decision.
When a user can agree to abide by our Acceptable Use Policies moving forward and has made the changes necessary to address the violation(s), we may choose to reinstate their account or data depending on the circumstances and severity of the initial violation.
12. Change Log
June 27, 2024: Complete overhaul
Last updated