Acceptable Use Policy
Last Updated: August 28, 2023
This Acceptable Use Policy (the “Policy”) applies to Your use of Tehama services (the “Services”) and the website located at https://tehama.io (the “Site”). Tehama may modify the terms of this Policy at any time by posting a revised version on the Site. By using the Services or the Site You agree to the latest version of the Policy. Violation of the terms of this Policy may result in termination of Your use of the Services.
No Illegal, Harmful, or Offensive Use of Content
You may not use, or encourage or facilitate others to use, the Services or the Site for: (1) any activities that are (a) illegal or violate the rights of others, (b) harmful to others or to Tehama’s operations and reputation, or (c) fraudulent; or (2) transmitting, storing, distributing, displaying or otherwise making available any content that (a) misappropriates or infringes the intellectual property rights of a third party, (b) may damage, interfere with, intercept or expropriate any systems, program or data, or (c) is defamatory, obscene, abusive, invasive of privacy or otherwise objectionable.
Any illegal, harmful or offensive use of the Services or the Site activity or content will entitle Tehama to suspend Your use of the Services or the Site and remove any prohibited content from the Services or the Site.
No Security Violations
You may not use the Services to violate the security or integrity of any system, including without limitation, networks, computer systems, communications systems, software and devices. Prohibited activities include:
- Accessing any system without permission;
- Monitoring any system data without permission;
- Interfering with the system’s performance and/or availability without permission;
- Introducing virus or malicious code into any system without permission;
- Targeting any system with Denial of Service (DoS) attack.
Vulnerability Bounty Program
Tehama takes security of its systems seriously. We ask for You to work with us, by reporting any vulnerabilities You identify in the Services or the Site provided via the app.tehama.io application and excluding the tehama.io site, via email at [email protected], prior to public disclosure. Tehama will review all submitted reports and respond to You with the next steps in the process. Based on the severity and impact of the vulnerability submitted we may offer a reward.
Reporting Violations of this Policy
If You identify an activity or content that You believe violates this Policy, please report it to [email protected]. Our dedicated team will review it and take action to remediate the violation, as required.
Any violation of this Policy may be considered violation of any other agreement we have with You. Tehama reserves the right to investigate any violation of this Policy, and take any action required to remediate it, including termination of any existing agreements between You and Tehama.
Copyright 2019-2023 Tehama Technologies Inc. and its affiliates or licensors. All Rights Reserved.
NOTICE: This document contains information and other content that is confidential and proprietary to Tehama Technologies Inc. or its affiliates or licensors and may be protected under the law of copyright, patent, or trade secret in Canada, the United States, and other jurisdictions. This document is provided for the internal business use only. No part of this document may be modified, reproduced, distributed or disclosed in any form to any third party without written permission of Tehama Technologies Inc.
TEHAMA and the Tehama logo are trade-marks of Tehama Technologies Inc. or its affiliates. All references herein to the corporate names, trade names, trademarks, and service marks of third parties are intended to accurately identify such parties as the sources of specific products and services. No claim of association or license is intended or should be inferred by such use.
Protect Sensitive Data and Eliminate Endpoint Security Concerns.
Find out how Tehama can help you deploy secure virtual desktops in 3 simple steps.Get a Demo