Acceptable Use Policy
Rules for Using Equerra Software
Effective Date: May 1, 2026
Version: 1.0
Last Updated: April 13, 2026
Introduction
This Acceptable Use Policy (AUP) defines the rules for using Equerra Software products available through Microsoft AppSource.
Purpose: To ensure the Software is used safely, legally, and responsibly by all customers.
Scope: This policy applies to all users of Equerra Software, including your employees, contractors, and anyone you authorize to access the Software.
Related Documents:
- Terms and Conditions - Main commercial terms
- Privacy Policy - How we handle data
- Security Measures - Our security practices
1. General Principles
1.1 Lawful Use
You must use the Software:
- For lawful business purposes only
- In compliance with all applicable laws and regulations
- In accordance with our Terms and Conditions
- In a manner that doesn't harm Equerra, Microsoft, or other customers
1.2 Professional Conduct
You must:
- Act responsibly and ethically
- Respect the rights of others
- Follow industry best practices
- Report security issues or violations promptly
2. Prohibited Activities
2.1 Security Violations
You Must Not:
- Attempt to undermine the security or integrity of our systems, Microsoft systems, or any third-party systems
- Probe, scan, or test the vulnerability of any system or network
- Breach or circumvent authentication or security measures
- Access data, systems, or networks without authorization
- Monitor data or traffic without authorization
- Forge headers or manipulate identifiers to disguise origin
- Use any automated tools to access the Software beyond normal use
Consequences: Immediate suspension or termination, potential legal action.
2.2 Illegal Content and Activities
You Must Not Use the Software To:
- Violate any law, regulation, or legal obligation
- Infringe intellectual property rights (copyrights, trademarks, patents, trade secrets)
- Distribute illegal content or materials
- Engage in fraud, deception, or misrepresentation
- Launder money or evade taxes
- Violate export control or sanctions laws
- Facilitate illegal gambling or activities
Examples of Prohibited Content:
- Pirated software or media
- Stolen data or credentials
- Counterfeit goods documentation
- Materials facilitating illegal activities
2.3 Harmful or Malicious Content
You Must Not Transmit or Store:
- Viruses, malware, ransomware, or malicious code
- Trojan horses, worms, or logic bombs
- Exploits or hacking tools
- Phishing or social engineering content
- Spam, unsolicited bulk messages, or chain letters
- Denial-of-service attack tools or code
Immediate Action: We'll remove harmful content and may suspend your account without notice.
2.4 Abusive Behavior
You Must Not:
- Harass, threaten, or abuse others
- Impersonate any person or entity
- Stalk or intimidate individuals
- Violate anyone's privacy rights
- Engage in hate speech or discrimination
- Bully or intimidate others
2.5 Inappropriate Content
You Must Not Store or Transmit:
- Child sexual abuse material (we report to authorities)
- Non-consensual intimate images
- Content promoting violence against individuals or groups
- Content facilitating self-harm or suicide
- Graphic violence or gore (except legitimate business documentation)
Zero Tolerance: Immediate termination and reporting to authorities.
3. Resource Use and Performance
3.1 Fair Use
You Must Not:
- Consume excessive system resources that impact other customers
- Use the Software in ways that degrade performance
- Run processes that interfere with normal operation
- Attempt to gain unauthorized access to additional resources
3.2 Automated Access
Restrictions on Automation:
- No automated scraping or data harvesting
- No automated account creation
- No bots or scripts beyond documented API usage
- Rate limits apply to all API access
Approved Automation:
- Normal software operation and integrations
- Documented API usage within rate limits
- Authorized third-party integrations
3.3 Service Availability
You Must Not:
- Take any action that impairs service availability
- Overload systems with requests
- Create denial-of-service conditions
- Interfere with other customers' use
4. Data and Privacy
4.1 Data Protection
You Must:
- Comply with applicable data protection laws (GDPR, NZ Privacy Act, AU Privacy Act)
- Obtain necessary consents for personal data processing
- Provide appropriate privacy notices
- Respect individuals' privacy rights
- Only collect and process data you have lawful basis for
You Must Not:
- Process personal data unlawfully
- Collect special categories of data without proper safeguards
- Transfer data in violation of applicable laws
- Use the Software to violate privacy rights
Full Details: Privacy Policy and Data Processing Agreement
4.2 Confidential Information
You Must:
- Protect confidential information
- Use confidential information only for permitted purposes
- Not disclose confidential information without authorization
You Must Not:
- Share login credentials
- Disclose sensitive business information inappropriately
- Expose customer or vendor data unlawfully
5. Intellectual Property
5.1 Respecting Our IP
You Must Not:
- Copy, modify, or reverse engineer the Software
- Remove or alter copyright notices or branding
- Use our trademarks without permission
- Create derivative works
- Extract source code or algorithms
Permitted Use:
- Normal use as licensed
- Displaying our product logos in connection with authorized use
5.2 Respecting Others' IP
You Must:
- Respect third-party intellectual property rights
- Obtain necessary licenses for content you upload
- Not infringe copyrights, trademarks, or patents
6. Account Security
6.1 Your Responsibilities
You Must:
- Use strong, unique passwords
- Enable multi-factor authentication
- Keep login credentials confidential
- Promptly notify us of unauthorized access
- Monitor user access within your organization
- Deactivate accounts for departed personnel
You Must Not:
- Share account credentials
- Use another person's account without authorization
- Attempt to access accounts other than your own
- Bypass authentication mechanisms
6.2 Suspicious Activity
Report Immediately:
- Unauthorized access attempts
- Compromised credentials
- Suspicious account activity
- Security vulnerabilities
Contact: security@equerra.com
7. Compliance and Reporting
7.1 Your Compliance Obligations
You Must:
- Ensure all users comply with this AUP
- Implement appropriate policies and training
- Monitor and enforce compliance
- Report violations promptly
7.2 Monitoring and Enforcement
Our Rights:
We may monitor use of the Software to:
- Ensure compliance with this AUP
- Detect security threats
- Investigate suspected violations
- Protect our systems and other customers
We Do Not:
- Routinely monitor the content of Customer Data
- Access Customer Data except as necessary to provide services or investigate violations
7.3 Reporting Violations
If You See a Violation:
Email: abuse@equerra.com
Provide:
- Description of the violation
- Evidence (screenshots, logs, etc.)
- Your contact information
- Any other relevant details
We investigate all reports confidentially.
8. Consequences of Violations
8.1 Enforcement Actions
Depending on severity, we may:
Warning: For minor or first-time violations
Suspension: Temporary access restriction while investigating
Termination: Permanent account closure for serious or repeated violations
Legal Action: Referral to law enforcement for illegal activities
No Refunds: Termination for violations doesn't entitle you to refunds
8.2 Immediate Termination
We may immediately terminate without warning for:
- Child sexual abuse material
- Distribution of malware
- Hacking or unauthorized access attempts
- Severe security violations
- Activities causing immediate harm
8.3 Legal Consequences
Violations may result in:
- Civil liability
- Criminal prosecution
- Regulatory enforcement
- Third-party claims
We cooperate with law enforcement and regulatory authorities.
9. Appeals and Disputes
9.1 If Your Account is Suspended
You May:
- Request information about the suspension
- Provide explanation or evidence
- Appeal the decision
Contact: legal@equerra.com
Response Time: Within 5 business days
9.2 Dispute Resolution
Disputes about AUP enforcement follow the process in our Terms and Conditions, Section 11.7.
10. Changes to This Policy
10.1 Updates
We may update this AUP to:
- Address new threats or risks
- Reflect changes in laws or regulations
- Improve clarity or completeness
- Respond to customer feedback
10.2 Notification
Material Changes: 30 days' notice via email and posting on this page
Your Acceptance: Continued use after changes constitutes acceptance
If You Don't Accept: You may terminate your subscription as provided in the Terms
11. Third-Party Responsibilities
11.1 Your Users
You're responsible for:
- Ensuring all your users comply with this AUP
- Training users on acceptable use
- Monitoring user activity
- Promptly addressing violations by your users
11.2 Third-Party Integrations
If you integrate the Software with third-party services:
- You're responsible for your use of those services
- Their acceptable use policies also apply
- We're not responsible for their actions
12. Examples of Acceptable and Unacceptable Use
12.1 Acceptable Use
Normal Business Operations:
- Managing financial data and transactions
- Storing customer and vendor information
- Processing orders and invoicing
- Generating business reports
- Integrating with approved third-party services
- Accessing data within your subscription
Appropriate Support Requests:
- Reporting bugs or issues
- Requesting feature enhancements
- Asking configuration questions
- Troubleshooting problems
12.2 Unacceptable Use
Security Testing (without permission):
- Penetration testing our systems
- Vulnerability scanning
- Attempting to access other customers' data
- Bypassing authentication
Resource Abuse:
- Running cryptocurrency mining operations
- Bulk email or spam distribution
- Hosting unrelated content or services
- Reselling access to unauthorized parties
Data Misuse:
- Scraping data beyond your subscription
- Collecting data for third-party marketing
- Processing data without legal basis
- Violating individuals' privacy rights
Questions and Clarifications
13.1 Need Guidance?
If you're unsure whether an activity is permitted:
Ask First: legal@equerra.com
We're happy to provide guidance before you proceed.
13.2 Request Exceptions
Some activities may be permitted with prior written approval:
- Security testing (must coordinate with our security team)
- High-volume API usage (may require enterprise plan)
- Special processing arrangements
Request: legal@equerra.com
Contact Information
General Questions: support@equerra.com
AUP Violations: abuse@equerra.com
Security Issues: security@equerra.com
Legal Matters: legal@equerra.com
Postal Address:
Equerra Limited
2nd Level
40 Lady Elizabeth Lane
Wellington Central
New Zealand 6011
Related Documents
Version History
| Version | Date | Changes |
|---|---|---|
| 1.0 | May 1, 2026 | Initial publication |
Summary: Use the Software legally, securely, and responsibly. Respect others' rights. Don't harm systems or data. Report issues promptly.
Equerra Limited
Strategic Solutions for Modern Business
© 2026 Equerra Limited. All rights reserved.