Bonneville Informatics LLC Acceptable Use Policy (AUP)
Last Updated: 2026-02-24
This Acceptable Use Policy ("AUP") governs the use of services provided by Bonneville Informatics LLC ("Bonneville Informatics," "BNI," "Provider," "we," "us," or "our").
This policy applies to all services, including but not limited to:
- Hosted virtual machines and infrastructure
- Remote desktop environments
- Artificial intelligence and automation systems
- System setup and configuration services
- Technical support services
- Websites, portals, and communication systems
By using Bonneville Informatics services ("Services"), you agree to comply with this AUP.
1. General Principle
Bonneville Informatics services may only be used for lawful, authorized, and legitimate purposes.
You are responsible for all activity occurring under your account or systems.
You must not use the Services in any way that:
- Violates any applicable law or regulation
- Harms Bonneville Informatics infrastructure
- Interferes with other customers
- Threatens system stability or security
Bonneville Informatics reserves the right to suspend or terminate Services for violations of this policy.
2. Prohibited Activities
The following activities are strictly prohibited:
2.1 Illegal Activity
Use of Services to:
- Violate any local, state, national, or international law
- Facilitate criminal activity
- Distribute illegal content
- Support illegal enterprises
2.2 Unauthorized Access and Intrusion
Attempting to:
- Gain unauthorized access to any system or network
- Probe, scan, or test system vulnerabilities without authorization
- Circumvent authentication or security controls
- Access other customers’ systems
2.3 Malware and Malicious Software
Hosting, distributing, or operating:
- Malware
- Viruses
- Ransomware
- Botnets
- Cryptominers without explicit authorization
- Rootkits or covert persistence mechanisms
This includes software designed to harm, disrupt, or gain unauthorized control of systems.
2.4 Network Abuse and Attacks
Using Services to conduct or facilitate:
- Distributed Denial of Service (DDoS) attacks
- Traffic flooding
- Network disruption
- Reflection or amplification attacks
- Packet flooding or SYN flooding
- Unauthorized port scanning
2.5 Spam and Messaging Abuse
Sending or facilitating:
- Unsolicited bulk messages (spam)
- SMS spam or violations of messaging carrier policies
- Email spam
- Automated messaging without recipient consent
- Messaging that violates TCPA, CTIA, or 10DLC requirements
All messaging must comply with applicable consent and opt-out requirements.
2.6 Fraud and Deceptive Practices
Using Services to:
- Conduct fraud or scams
- Impersonate individuals or organizations
- Misrepresent identity
- Conduct phishing or credential harvesting
2.7 Artificial Intelligence Abuse
Using artificial intelligence or automated systems to:
- Conduct unauthorized scanning or intrusion
- Launch attacks or abuse infrastructure
- Circumvent security controls
- Operate autonomously in ways that violate this AUP
You remain fully responsible for AI and automated system behavior.
2.8 Resource Abuse
Using Services in ways that:
- Consume excessive infrastructure resources
- Interfere with other customers
- Cause instability or degradation of infrastructure
Bonneville Informatics may limit or suspend systems causing excessive load.
2.9 Cryptocurrency Mining (Without Authorization)
Cryptocurrency mining is prohibited unless explicitly authorized by Bonneville Informatics.
Unauthorized mining may result in immediate suspension.
3. System Security Requirements
You must take reasonable steps to secure your systems, including:
- Using strong passwords
- Applying security updates
- Maintaining secure configurations
- Protecting credentials
You are responsible for all activity originating from your systems.
4. Customer Responsibility for Artificial Intelligence and Automation
You are fully responsible for all AI, automation, and agentic software deployed on your systems.
This includes:
- Actions taken autonomously
- Network access initiated by AI systems
- System modifications performed by automation
AI behavior does not exempt you from compliance with this AUP.
5. Enforcement and Violations
Bonneville Informatics may investigate suspected violations.
We reserve the right to:
- Suspend systems immediately
- Terminate services
- Restrict access
- Remove offending content
- Report illegal activity to authorities
Suspension may occur without prior notice if necessary to protect infrastructure.
6. Security Protection Actions
Bonneville Informatics may take protective actions including:
- Blocking network traffic
- Limiting system resources
- Isolating systems
- Restricting connectivity
These actions may be taken automatically or manually to protect infrastructure.
7. Reporting Violations
Suspected violations may be reported to:
support@bonnevilleinformatics.com
Include relevant details such as:
- IP address
- System identifier
- Description of activity
8. No Expectation of Privacy for Abuse Investigation
Bonneville Informatics reserves the right to access system metadata and logs necessary to investigate abuse, protect infrastructure, and comply with law.
Bonneville Informatics does not routinely monitor system contents.
9. Cooperation with Law Enforcement
Bonneville Informatics may cooperate with law enforcement where required by law.
10. Changes to This Policy
Bonneville Informatics may update this AUP periodically.
Updated versions will be posted at:
https://bonnevilleinformatics.com/legal/aup
Continued use of Services constitutes acceptance.
11. Contact Information
Bonneville Informatics LLC
Idaho Falls, Idaho
support@bonnevilleinformatics.com
https://bonnevilleinformatics.com