1. Summary
Use Vectis for its intended purpose — running your MSP — and treat the Service, other tenants, and the third-party systems you connect with respect. Do not attack, abuse, or misuse the platform.
2. Prohibited activities
You may not use the Service to:
- violate any law, regulation, or third-party right, including intellectual-property or privacy rights;
- interfere with or disrupt the Service, the infrastructure that runs it, or any other customer’s use of the Service;
- attempt to gain unauthorised access to any portion of the Service, another tenant’s instance, or any linked third-party system;
- reverse engineer, decompile, scrape, or resell the Service except as permitted in writing;
- upload, store, or transmit malware, exploit code, or any payload intended to compromise systems;
- impersonate any person or organisation, or misrepresent your authority to act on behalf of an MSP or its end customers;
- transmit unsolicited bulk communications (spam) via any feature of the Service that can send messages, including notification channels, digests, or customer portal invitations;
- exceed the usage limits of your subscription plan through automated means, bots, scripts, or other mechanisms designed to evade enforcement; or
- use the Service to generate or distribute content that is unlawful, harmful, threatening, defamatory, harassing, or hateful.
3. Third-party systems
Vectis takes action in third-party systems you connect (for example, ticketing, RMM, and billing platforms) at your direction. You are responsible for:
- having valid authorisation to connect and act within every third-party account;
- complying with the terms of service, rate limits, and acceptable use of each third-party provider;
- any data you push into, or pull out of, those systems via the Service.
Abusive use of a connected system — for example, runaway rules that generate hundreds of write-backs per minute — may trigger rate limits, circuit breakers, or suspensions imposed by us to protect the provider or other customers.
4. Security expectations
You must keep your account credentials, API keys, and integration credentials confidential. If you suspect any have been compromised, notify us at security@mspvectis.com promptly and rotate the relevant secrets. Do not probe, scan, or test the security of the Service without prior written authorisation (responsible disclosure is welcome — contact us first).
5. Enforcement
We may investigate suspected violations, preserve evidence, and take action proportionate to the severity — ranging from a written warning, to feature suspension, to account termination, to reporting to law enforcement. We may act without prior notice when doing so is necessary to protect the Service, other customers, or third parties. Our enforcement decisions are documented in the Terms of Service, which govern in the event of any conflict.
6. Reporting abuse
If you believe another user or tenant is violating this policy, report it to abuse@mspvectis.com with enough detail (URLs, identifiers, timestamps) for us to investigate. We treat reports confidentially to the extent consistent with legal obligations.
7. Changes
We may update this policy from time to time. Material changes will be announced on the marketing site; continued use of the Service after a change constitutes acceptance.