Guidelines
Acceptable use policies and prohibited activities for Alluno services
These guidelines define acceptable use of Alluno’s remote desktop platform and outline prohibited activities to ensure a safe, secure, and reliable service for all users.
Permitted Uses
Alluno is designed to enable legitimate remote desktop access and collaboration. The following uses are encouraged:
Personal & Professional Use
Business Applications
- Team Projects: Working together on shared tasks
- Screen Sharing: Demonstrating software or presentations
- Remote Training: Conducting employee education sessions
- Client Demonstrations: Showing products or services
Gaming & Entertainment
- Cloud Gaming: Streaming games from powerful remote machines
- Game Development: Testing games across different platforms
- Media Consumption: Accessing entertainment content on remote devices
- Software Exploration: Trying new applications and tools
Prohibited Activities
The following activities are strictly prohibited and may result in account suspension or termination:
Illegal Activities
- Any illegal activity under applicable local, state, national, or international laws
- Hacking or cracking software, systems, or security measures
- Unauthorized access to devices, networks, or systems not owned by you
- Copyright infringement including piracy of software, media, or content
- Distribution of malware including viruses, trojans, or other malicious code
- Fraud or identity theft using our platform to deceive others
Security Violations
Prohibited Actions:
- Attempting to reverse engineer our software or protocols
- Performing security scans or penetration tests without permission
- Attempting to access other users' data or sessions
- Circumventing access controls or security measures
Abuse & Harassment
Commercial Violations
Unauthorized Reselling
You cannot resell access to Alluno services without explicit written authorization.
Competing Services
You cannot use our platform to develop or operate competing remote desktop services.
Mass Registration
Bulk creation of accounts for commercial purposes without enterprise agreement is prohibited.
Service Abuse
Using free accounts for commercial purposes that should require paid subscriptions.
Content Restrictions
Prohibited Content
You may not use Alluno to access, store, or distribute:
- Child exploitation material of any kind
- Terrorist content or extremist materials
- Illegal drugs or controlled substances information
- Weapons trafficking or illegal firearms content
Content Monitoring
Privacy Respect: We do not monitor the content of your remote desktop sessions. However, we may investigate reported violations or suspicious activity.
Our Approach:
- No Session Monitoring: We don't watch or record your remote sessions
- Report-Based Investigation: We investigate only when violations are reported
- Technical Evidence: We may examine connection logs and usage patterns
- User Privacy: Content privacy is maintained during investigations
Enforcement
Violation Response
When we become aware of potential violations:
Investigation
We review reported violations and examine available evidence while respecting user privacy.
Warning System
First-time minor violations typically receive warnings with guidance for compliance.
Account Restrictions
Repeated or serious violations may result in temporary restrictions on account features.
Account Suspension
Severe violations or repeated policy breaches may result in temporary account suspension.
Account Termination
Serious violations, illegal activities, or persistent abuse may result in permanent termination.
Appeal Process
If you believe your account has been restricted unfairly:
- Contact Support: Email [email protected] with details
- Provide Context: Explain the circumstances and provide relevant information
- Review Process: We'll review the restriction and provide a response
- Resolution: Appropriate action will be taken based on the review results
Reporting Violations
How to Report
If you encounter violations of these guidelines:
Contact [email protected] with the following information:
- Description of the violation
- Account or session information (if available)
- Evidence or documentation
- Your contact information for follow-up
Contact Information
For questions about acceptable use or to report violations:
Abuse Reports
Response: Within 24 hours
Security Issues
Response: Immediate for critical issues