Acceptable Use Policy

Guidelines for responsible use of Foxstone services, systems, and deliverables.

Introduction

When you engage Foxstone Industries for consulting, infrastructure management, AI integration, web hosting, or any related technology service, you become part of our client community — and part of the broader digital ecosystem we all share. This relationship carries mutual rights and responsibilities.

This Acceptable Use Policy (“AUP”) defines the boundaries for responsible use of Foxstone services. The following principles guide its creation and enforcement:

  • Ensure reliable, high-quality service for all clients
  • Protect the security and privacy of our systems, networks, and client data
  • Comply with all applicable local, state, federal, and international laws
  • Maintain our reputation as a responsible technology partner
  • Encourage responsible use of technology and discourage activities that degrade shared resources
  • Preserve the privacy and security of individual users and organizations

Foxstone is committed to delivering open, capable technology solutions. However, certain activities are harmful to our resources, our clients, and the broader community. This policy outlines what is and is not acceptable.

We do not routinely monitor client activity except for system utilization measurements and billing purposes. However, we will respond appropriately if we become aware of a violation of this policy.

Violation of this AUP may result in immediate termination of services without notice. You agree to indemnify Foxstone Industries and its affiliates against any claims arising from your violation of this policy. We prefer to advise clients of issues and offer corrective guidance, but flagrant violations will result in immediate termination. Our failure to enforce any provision of this policy shall not constitute a waiver of our right to do so at any time.

Questions about this policy can be directed to abuse@foxstone.com.

General Conduct

Foxstone clients are prohibited from using any of our services to transmit, store, or process material that is — in Foxstone’s sole discretion — unlawful, obscene, threatening, abusive, defamatory, libelous, or that encourages conduct constituting a criminal offense, gives rise to civil liability, or otherwise violates any applicable law.

In general, you may not use Foxstone services:

  • In a manner that violates any law, regulation, treaty, or tariff
  • In a manner that violates the rules, regulations, and policies of any network, server, platform, or service provider accessed through our services
  • In a manner that is defamatory, fraudulent, indecent, offensive, or deceptive
  • To threaten, harass, abuse, or intimidate others
  • To damage the name or reputation of Foxstone Industries, its affiliates, or its clients
  • To breach security on any computer, network, or system, or to access any account or data without authorization
  • In a manner that interferes with other clients’ use and enjoyment of Foxstone services

Foxstone services may only be used for lawful purposes. Transmission, distribution, or storage of any material in violation of applicable law — including material protected by copyright, trademark, trade secret, or other statute — is prohibited. Foxstone reserves the right to remove such material or immediately terminate services.

You are responsible for keeping your billing and contact information with Foxstone accurate and up to date. Furnishing false data on any contract or application, including fraudulent use of payment methods, is grounds for immediate termination and may result in civil or criminal liability.

Foxstone reserves sole discretion to determine whether any use of our services constitutes a violation of this policy.

Electronic Mail

Clients with email services provisioned by Foxstone must use them responsibly. Misuse may result in termination of service. The following are non-exclusive examples:

  • You may not send unsolicited bulk or commercial messages (“spam”), including bulk advertising, announcements, charity requests, petitions, or political/religious solicitations. Such messages may only be sent to recipients who have explicitly opted in.
  • You may not use your account to collect responses from unsolicited messages sent via other providers.
  • Forging, altering, or removing email headers is prohibited.
  • You may not send excessive copies of the same or substantially similar message, nor send very large messages with intent to disrupt a server or account (“mail bombing”).
  • Email harassment — whether through language, frequency, or message size — is prohibited. If a recipient asks to stop receiving messages, you must comply immediately.
  • You may not forward or propagate chain letters, regardless of content.
  • If you use another provider’s services to promote a website or service hosted by Foxstone, this AUP applies to those promotional methods as well.

Security

You are responsible for any misuse of your account or services, even if the inappropriate activity was committed by an employee, contractor, guest, or other third party. You must take reasonable steps to prevent unauthorized access to your accounts, systems, and any credentials or API keys provisioned as part of our services.

  • You must adopt adequate security measures to prevent or minimize unauthorized use of your accounts and systems.
  • You may not attempt to circumvent user authentication or security of any host, network, or account. This includes accessing data not intended for you, logging into servers or accounts without authorization, and probing the security of other networks.
  • Use or distribution of tools designed to compromise security (password-guessing programs, cracking tools, network probing utilities) is prohibited.
  • You may not attempt to interfere with service to any user, host, or network (“denial of service attacks”), including flooding, deliberate overload attempts, and attempts to crash systems.
  • Violations of system or network security may incur criminal or civil liability. Foxstone will cooperate fully with law enforcement investigations of suspected criminal violations.

AI & Automation Services

When Foxstone provides AI integration, automation, or data processing services, the following additional provisions apply:

  • You are responsible for ensuring that any data you provide for AI training, processing, or analysis has been collected and is being used in compliance with all applicable privacy laws and regulations.
  • AI-generated outputs delivered as part of our services are tools to assist decision-making — not a substitute for professional judgment, legal advice, or regulatory compliance.
  • You may not use AI solutions built or deployed by Foxstone to generate content that is illegal, deceptive, defamatory, or designed to impersonate real individuals without consent.
  • You may not use Foxstone-built AI systems to conduct unauthorized surveillance, profiling, or discrimination.
  • Foxstone makes no guarantee of specific AI model performance. AI solutions are provided on a best-effort basis and are subject to the inherent limitations of underlying models and data quality.

Infrastructure & Network Management

If Foxstone manages infrastructure on your behalf — whether hosted on our servers, in your environment, or in the cloud — the following responsibilities apply:

  • You must designate one or more authorized contacts who can make decisions regarding your infrastructure. You must provide current names, phone numbers, and email addresses and keep this information accurate at all times.
  • Authorized contacts must have the authority and access necessary to approve changes, respond to incidents, and configure systems as needed.
  • If your services include hosting with third-party access (employees, customers, end-users), you must maintain an active postmaster or abuse contact address and respond to complaints in a timely manner.

Resource Usage

Foxstone services operate on shared and dedicated resources. Excessive use or abuse of shared resources has a negative impact on all clients. Misuse that impairs system or network performance is prohibited and may result in service termination.

  • Excessive consumption of CPU, memory, disk space, bandwidth, or session time beyond allocated limits is prohibited.
  • Resource-intensive processes that negatively impact other clients or overall system performance may be terminated or throttled at Foxstone’s discretion.

Illegal Activity

Any activity conducted through Foxstone services that violates any state or federal law is a violation of this policy and will result in immediate termination of service. Prohibited activities include, but are not limited to:

  • Transmitting obscene materials or child sexual abuse material (CSAM)
  • Intentionally spreading or threatening to spread computer viruses, malware, or ransomware
  • Gaining or attempting to gain unauthorized access to any network, including Foxstone’s private infrastructure
  • Accessing or attempting to access information not intended for you
  • Transmitting pirated or stolen intellectual property
  • Conducting or participating in illegal gambling
  • Soliciting for pyramid schemes or other illegal schemes
  • Using Foxstone services to facilitate fraud, money laundering, or identity theft

Foxstone does not permit any content that exploits minors or promotes exploitation of minors. As required by United States federal law, Foxstone will report all violations to the appropriate federal authorities.

Confidentiality & Data Handling

Many of our engagements involve access to proprietary business information, infrastructure credentials, and sensitive data. Foxstone treats all client data as confidential and handles it in accordance with our Terms & Conditions.

  • You are responsible for informing Foxstone of any regulatory requirements (HIPAA, PCI-DSS, SOC 2, GDPR, etc.) that apply to the data or systems involved in your engagement.
  • You must not share Foxstone-provisioned credentials, access tokens, or API keys with unauthorized third parties.
  • If your engagement includes access to Foxstone’s internal tools, staging environments, or development systems, that access is granted solely for the purposes of the engagement and must not be used for any other purpose.

Privacy Statement

Foxstone Industries respects and protects the privacy of its clients and the information stored with us. We will only access or disclose client information as necessary to:

  • Comply with applicable laws and government requests
  • Provide and maintain Foxstone services
  • Operate and secure our systems
  • Protect Foxstone, our clients, and the public interest

We do not sell, rent, or share client information with third parties for marketing purposes.

Contact Us

If you have questions about this policy or need clarification on acceptable use, we’re happy to help.