1. PURPOSE
This Acceptable Use Policy ("AUP") governs your use of Focal Deploy LLC's ("Focal Deploy", "we", "us", or "our") cloud deployment automation platform (the "Service"). This policy is designed to protect Focal Deploy, our users, and the internet community from irresponsible or illegal activities.
BY USING THE SERVICE, YOU AGREE TO COMPLY WITH THIS AUP. VIOLATION MAY RESULT IN IMMEDIATE TERMINATION OF YOUR ACCOUNT WITHOUT REFUND.
2. PROHIBITED ACTIVITIES
You may NOT use the Service to:
2.1 Illegal Activities
- Violate any local, state, national, or international law or regulation
- Engage in any activity that promotes illegal activities
- Deploy content related to illegal drugs, weapons, or other contraband
- Facilitate gambling, money laundering, or financial fraud
- Distribute child sexual abuse material (CSAM) or child exploitation content
- Engage in human trafficking or exploitation
- Violate export control or sanctions laws
2.2 Malicious or Harmful Content
- Deploy malware, viruses, ransomware, trojans, or other malicious code
- Distribute spyware, adware, or unwanted software
- Create or host phishing sites or fraudulent content
- Deploy keyloggers, rootkits, or other unauthorized monitoring tools
- Host content designed to exploit security vulnerabilities
- Distribute pirated software, media, or content
2.3 Abusive or Harmful Behavior
- Harass, threaten, stalk, or intimidate individuals
- Deploy hate speech, discrimination, or content promoting violence
- Engage in doxxing or unauthorized disclosure of personal information
- Impersonate any person, business, or entity
- Engage in cyberbullying or targeted harassment campaigns
2.4 Network Abuse and Attacks
- Launch denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
- Conduct port scanning, network probing, or vulnerability scanning without authorization
- Deploy botnets or command-and-control (C2) infrastructure
- Engage in IP spoofing or packet flooding
- Attempt to gain unauthorized access to systems, networks, or accounts
- Intercept or monitor network traffic without authorization
- Deploy honeypots or deceptive infrastructure for malicious purposes
2.5 Spam and Unwanted Communications
- Send unsolicited bulk email (spam)
- Deploy email bombing or SMS flooding attacks
- Harvest email addresses or scrape contact information
- Engage in chain letters, pyramid schemes, or multi-level marketing spam
- Deploy auto-dialers, robocalls, or SMS spamming infrastructure
2.6 Intellectual Property Violations
- Deploy applications that infringe copyrights, trademarks, patents, or trade secrets
- Host pirated software, games, movies, music, or other media
- Circumvent digital rights management (DRM) or copy protection systems
- Deploy unauthorized streaming or download sites
2.7 Resource Abuse
- Engage in cryptocurrency mining without explicit written authorization from Focal Deploy
- Consume excessive bandwidth, CPU, or storage resources
- Run applications designed to degrade service performance
- Deploy bitcoin mining, Ethereum mining, or similar resource-intensive operations
- Operate Tor exit nodes or proxy services for anonymous browsing without authorization
2.8 Fraud and Deception
- Deploy fraudulent websites, scams, or misleading content
- Engage in identity theft or credit card fraud
- Create fake reviews, ratings, or testimonials
- Operate Ponzi schemes, pyramid schemes, or investment fraud
- Deploy fake shopping sites or payment fraud infrastructure
2.9 Privacy Violations
- Collect personal information without consent or proper disclosure
- Violate data protection laws (GDPR, CCPA, etc.)
- Deploy tracking or surveillance tools without user consent
- Engage in unauthorized data scraping or harvesting
- Store or process sensitive data (PII, health records, financial data) without proper security measures
2.10 Service Abuse
- Circumvent usage limits, rate limits, or access controls
- Share account credentials with unauthorized parties
- Create multiple accounts to evade restrictions
- Reverse engineer, decompile, or disassemble the Service
- Interfere with or disrupt the Service or other users' use of the Service
- Use the Service for competitive analysis or benchmarking without permission
3. CLOUD PROVIDER COMPLIANCE
In addition to this AUP, you must comply with the acceptable use policies of all cloud providers you deploy to:
- AWS Acceptable Use Policy: aws.amazon.com/aup
- Google Cloud Acceptable Use Policy: cloud.google.com/terms/aup
- DigitalOcean Terms of Service: digitalocean.com/legal/terms
Violations of cloud provider policies may result in suspension or termination of your cloud resources and your Focal Deploy account.
4. SECURITY REQUIREMENTS
You are required to:
- Implement appropriate security measures for your applications and deployments
- Keep all software and dependencies up to date with security patches
- Use strong, unique passwords and enable two-factor authentication (2FA)
- Properly configure firewalls, security groups, and access controls
- Encrypt sensitive data in transit and at rest
- Monitor your deployments for security incidents
- Promptly address any security vulnerabilities discovered
- Report security incidents to Focal Deploy within 24 hours
5. REPORTING VIOLATIONS
If you become aware of any violations of this AUP, please report them immediately to:
Abuse Team
Email: abuse@focuswithfocal.com
Please include detailed information about the violation, including:
- Description of the violation
- URLs, IP addresses, or account information
- Date and time of the incident
- Any evidence or screenshots
6. ENFORCEMENT
Focal Deploy reserves the right to investigate suspected violations of this AUP. Upon discovery of a violation, we may:
6.1 Immediate Actions
- Suspend or terminate your account without notice
- Remove or disable access to violating content
- Terminate your deployments and cloud resources
- Block your access to the Service
- Refuse future service
6.2 Legal Actions
- Report violations to law enforcement authorities
- Cooperate with legal investigations
- Pursue civil or criminal legal action
- Seek damages and injunctive relief
6.3 No Refunds
Accounts terminated for AUP violations are not eligible for refunds. You remain responsible for all fees incurred prior to termination.
7. MONITORING AND INVESTIGATION
We reserve the right to:
- Monitor usage patterns and resource consumption
- Scan deployed content for malware and prohibited material
- Investigate complaints and abuse reports
- Access deployment logs and configurations when investigating violations
- Cooperate with third-party investigations
We will make reasonable efforts to notify you of investigations unless prohibited by law or when notification would impede the investigation.
8. INDEMNIFICATION
You agree to indemnify and hold Focal Deploy harmless from any claims, damages, losses, liabilities, and expenses (including attorney fees) arising from your violation of this AUP or your use of the Service.
9. MODIFICATIONS
We reserve the right to modify this AUP at any time. Material changes will be communicated via email or through the Service. Your continued use of the Service after such modifications constitutes acceptance of the updated AUP.
10. CONTACT INFORMATION
For questions about this AUP, contact us at:
IMPORTANT: VIOLATION OF THIS ACCEPTABLE USE POLICY MAY RESULT IN IMMEDIATE TERMINATION OF YOUR ACCOUNT, LEGAL ACTION, AND REPORTING TO LAW ENFORCEMENT.
BY USING FOCAL DEPLOY, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO COMPLY WITH THIS ACCEPTABLE USE POLICY.
© 2025 Focal Deploy LLC. All rights reserved.