Acceptable Use Policy

Rules for Using Equerra Software

Effective Date: May 1, 2026
Version: 1.0
Last Updated: April 13, 2026

Introduction

This Acceptable Use Policy (AUP) defines the rules for using Equerra Software products available through Microsoft AppSource.

Purpose: To ensure the Software is used safely, legally, and responsibly by all customers.

Scope: This policy applies to all users of Equerra Software, including your employees, contractors, and anyone you authorize to access the Software.

Related Documents:

1. General Principles

1.1 Lawful Use

You must use the Software:

  • For lawful business purposes only
  • In compliance with all applicable laws and regulations
  • In accordance with our Terms and Conditions
  • In a manner that doesn't harm Equerra, Microsoft, or other customers

1.2 Professional Conduct

You must:

  • Act responsibly and ethically
  • Respect the rights of others
  • Follow industry best practices
  • Report security issues or violations promptly

2. Prohibited Activities

2.1 Security Violations

You Must Not:

  • Attempt to undermine the security or integrity of our systems, Microsoft systems, or any third-party systems
  • Probe, scan, or test the vulnerability of any system or network
  • Breach or circumvent authentication or security measures
  • Access data, systems, or networks without authorization
  • Monitor data or traffic without authorization
  • Forge headers or manipulate identifiers to disguise origin
  • Use any automated tools to access the Software beyond normal use

Consequences: Immediate suspension or termination, potential legal action.

2.2 Illegal Content and Activities

You Must Not Use the Software To:

  • Violate any law, regulation, or legal obligation
  • Infringe intellectual property rights (copyrights, trademarks, patents, trade secrets)
  • Distribute illegal content or materials
  • Engage in fraud, deception, or misrepresentation
  • Launder money or evade taxes
  • Violate export control or sanctions laws
  • Facilitate illegal gambling or activities

Examples of Prohibited Content:

  • Pirated software or media
  • Stolen data or credentials
  • Counterfeit goods documentation
  • Materials facilitating illegal activities

2.3 Harmful or Malicious Content

You Must Not Transmit or Store:

  • Viruses, malware, ransomware, or malicious code
  • Trojan horses, worms, or logic bombs
  • Exploits or hacking tools
  • Phishing or social engineering content
  • Spam, unsolicited bulk messages, or chain letters
  • Denial-of-service attack tools or code

Immediate Action: We'll remove harmful content and may suspend your account without notice.

2.4 Abusive Behavior

You Must Not:

  • Harass, threaten, or abuse others
  • Impersonate any person or entity
  • Stalk or intimidate individuals
  • Violate anyone's privacy rights
  • Engage in hate speech or discrimination
  • Bully or intimidate others

2.5 Inappropriate Content

You Must Not Store or Transmit:

  • Child sexual abuse material (we report to authorities)
  • Non-consensual intimate images
  • Content promoting violence against individuals or groups
  • Content facilitating self-harm or suicide
  • Graphic violence or gore (except legitimate business documentation)

Zero Tolerance: Immediate termination and reporting to authorities.

3. Resource Use and Performance

3.1 Fair Use

You Must Not:

  • Consume excessive system resources that impact other customers
  • Use the Software in ways that degrade performance
  • Run processes that interfere with normal operation
  • Attempt to gain unauthorized access to additional resources

3.2 Automated Access

Restrictions on Automation:

  • No automated scraping or data harvesting
  • No automated account creation
  • No bots or scripts beyond documented API usage
  • Rate limits apply to all API access

Approved Automation:

  • Normal software operation and integrations
  • Documented API usage within rate limits
  • Authorized third-party integrations

3.3 Service Availability

You Must Not:

  • Take any action that impairs service availability
  • Overload systems with requests
  • Create denial-of-service conditions
  • Interfere with other customers' use

4. Data and Privacy

4.1 Data Protection

You Must:

  • Comply with applicable data protection laws (GDPR, NZ Privacy Act, AU Privacy Act)
  • Obtain necessary consents for personal data processing
  • Provide appropriate privacy notices
  • Respect individuals' privacy rights
  • Only collect and process data you have lawful basis for

You Must Not:

  • Process personal data unlawfully
  • Collect special categories of data without proper safeguards
  • Transfer data in violation of applicable laws
  • Use the Software to violate privacy rights

Full Details: Privacy Policy and Data Processing Agreement

4.2 Confidential Information

You Must:

  • Protect confidential information
  • Use confidential information only for permitted purposes
  • Not disclose confidential information without authorization

You Must Not:

  • Share login credentials
  • Disclose sensitive business information inappropriately
  • Expose customer or vendor data unlawfully

5. Intellectual Property

5.1 Respecting Our IP

You Must Not:

  • Copy, modify, or reverse engineer the Software
  • Remove or alter copyright notices or branding
  • Use our trademarks without permission
  • Create derivative works
  • Extract source code or algorithms

Permitted Use:

  • Normal use as licensed
  • Displaying our product logos in connection with authorized use

5.2 Respecting Others' IP

You Must:

  • Respect third-party intellectual property rights
  • Obtain necessary licenses for content you upload
  • Not infringe copyrights, trademarks, or patents

6. Account Security

6.1 Your Responsibilities

You Must:

  • Use strong, unique passwords
  • Enable multi-factor authentication
  • Keep login credentials confidential
  • Promptly notify us of unauthorized access
  • Monitor user access within your organization
  • Deactivate accounts for departed personnel

You Must Not:

  • Share account credentials
  • Use another person's account without authorization
  • Attempt to access accounts other than your own
  • Bypass authentication mechanisms

6.2 Suspicious Activity

Report Immediately:

  • Unauthorized access attempts
  • Compromised credentials
  • Suspicious account activity
  • Security vulnerabilities

Contact: security@equerra.com

7. Compliance and Reporting

7.1 Your Compliance Obligations

You Must:

  • Ensure all users comply with this AUP
  • Implement appropriate policies and training
  • Monitor and enforce compliance
  • Report violations promptly

7.2 Monitoring and Enforcement

Our Rights:

We may monitor use of the Software to:

  • Ensure compliance with this AUP
  • Detect security threats
  • Investigate suspected violations
  • Protect our systems and other customers

We Do Not:

  • Routinely monitor the content of Customer Data
  • Access Customer Data except as necessary to provide services or investigate violations

7.3 Reporting Violations

If You See a Violation:

Email: abuse@equerra.com

Provide:

  • Description of the violation
  • Evidence (screenshots, logs, etc.)
  • Your contact information
  • Any other relevant details

We investigate all reports confidentially.

8. Consequences of Violations

8.1 Enforcement Actions

Depending on severity, we may:

Warning: For minor or first-time violations

Suspension: Temporary access restriction while investigating

Termination: Permanent account closure for serious or repeated violations

Legal Action: Referral to law enforcement for illegal activities

No Refunds: Termination for violations doesn't entitle you to refunds

8.2 Immediate Termination

We may immediately terminate without warning for:

  • Child sexual abuse material
  • Distribution of malware
  • Hacking or unauthorized access attempts
  • Severe security violations
  • Activities causing immediate harm

8.3 Legal Consequences

Violations may result in:

  • Civil liability
  • Criminal prosecution
  • Regulatory enforcement
  • Third-party claims

We cooperate with law enforcement and regulatory authorities.

9. Appeals and Disputes

9.1 If Your Account is Suspended

You May:

  • Request information about the suspension
  • Provide explanation or evidence
  • Appeal the decision

Contact: legal@equerra.com

Response Time: Within 5 business days

9.2 Dispute Resolution

Disputes about AUP enforcement follow the process in our Terms and Conditions, Section 11.7.

10. Changes to This Policy

10.1 Updates

We may update this AUP to:

  • Address new threats or risks
  • Reflect changes in laws or regulations
  • Improve clarity or completeness
  • Respond to customer feedback

10.2 Notification

Material Changes: 30 days' notice via email and posting on this page

Your Acceptance: Continued use after changes constitutes acceptance

If You Don't Accept: You may terminate your subscription as provided in the Terms

11. Third-Party Responsibilities

11.1 Your Users

You're responsible for:

  • Ensuring all your users comply with this AUP
  • Training users on acceptable use
  • Monitoring user activity
  • Promptly addressing violations by your users

11.2 Third-Party Integrations

If you integrate the Software with third-party services:

  • You're responsible for your use of those services
  • Their acceptable use policies also apply
  • We're not responsible for their actions

12. Examples of Acceptable and Unacceptable Use

12.1 Acceptable Use

Normal Business Operations:

  • Managing financial data and transactions
  • Storing customer and vendor information
  • Processing orders and invoicing
  • Generating business reports
  • Integrating with approved third-party services
  • Accessing data within your subscription

Appropriate Support Requests:

  • Reporting bugs or issues
  • Requesting feature enhancements
  • Asking configuration questions
  • Troubleshooting problems

12.2 Unacceptable Use

Security Testing (without permission):

  • Penetration testing our systems
  • Vulnerability scanning
  • Attempting to access other customers' data
  • Bypassing authentication

Resource Abuse:

  • Running cryptocurrency mining operations
  • Bulk email or spam distribution
  • Hosting unrelated content or services
  • Reselling access to unauthorized parties

Data Misuse:

  • Scraping data beyond your subscription
  • Collecting data for third-party marketing
  • Processing data without legal basis
  • Violating individuals' privacy rights

Questions and Clarifications

13.1 Need Guidance?

If you're unsure whether an activity is permitted:

Ask First: legal@equerra.com

We're happy to provide guidance before you proceed.

13.2 Request Exceptions

Some activities may be permitted with prior written approval:

  • Security testing (must coordinate with our security team)
  • High-volume API usage (may require enterprise plan)
  • Special processing arrangements

Request: legal@equerra.com

Contact Information

General Questions: support@equerra.com

AUP Violations: abuse@equerra.com

Security Issues: security@equerra.com

Legal Matters: legal@equerra.com

Postal Address:

Equerra Limited

2nd Level

40 Lady Elizabeth Lane

Wellington Central

New Zealand 6011

Related Documents

Version History

Version Date Changes
1.0 May 1, 2026 Initial publication

Summary: Use the Software legally, securely, and responsibly. Respect others' rights. Don't harm systems or data. Report issues promptly.

Equerra Limited
Strategic Solutions for Modern Business

© 2026 Equerra Limited. All rights reserved.