Acceptable Use Policy
Last updated: January 1, 2025
Important
ShareTeamCodes is designed for legitimate B2B use cases where organizations need to share access to accounts they own or operate. Misuse of this service for unauthorized access to accounts is strictly prohibited and may result in immediate termination and legal action.
1. Permitted Use
ShareTeamCodes is intended for organizations to securely manage MFA codes for accounts that they legitimately own, operate, or have been explicitly authorized to access. Permitted uses include:
- Managing shared access to company-owned service accounts
- Centralizing MFA for organizational infrastructure accounts
- Team access to vendor portals where the organization is the account owner
- Emergency access procedures for critical business accounts
2. Prohibited Activities
The following activities are strictly prohibited:
- Accessing accounts without proper authorization from the account owner
- Using ShareTeamCodes to bypass security controls on third-party systems
- Automating login processes or OTP submission to third-party services
- Sharing ShareTeamCodes access to enable unauthorized account access
- Using ShareTeamCodes for phishing, fraud, or identity theft
- Violating the terms of service of any third-party platform
- Reselling or redistributing the service
- Attempting to extract or export OTP data in bulk
- Circumventing rate limits or security measures
3. Account Requirements
ShareTeamCodes is available only to business organizations:
- Accounts must be registered with a valid business email domain
- Personal email addresses (gmail.com, yahoo.com, etc.) are not permitted
- Organizations must designate an account owner responsible for compliance
- Users must authenticate with their organizational identity
4. Compliance Responsibilities
As a user of ShareTeamCodes, you are responsible for:
- Ensuring you have proper authorization for all accounts managed through ShareTeamCodes
- Maintaining accurate records of account ownership and authorization
- Configuring appropriate access controls and role assignments
- Regularly reviewing audit logs for unauthorized activity
- Reporting any security incidents or suspected misuse
5. Monitoring and Enforcement
We reserve the right to:
- Monitor usage patterns for compliance with this policy
- Investigate reported violations
- Suspend or terminate accounts that violate this policy
- Report illegal activity to law enforcement
- Cooperate with legal investigations
6. Consequences of Violation
Violations of this Acceptable Use Policy may result in:
- Warning and required corrective action
- Temporary suspension of service
- Permanent termination of service without refund
- Legal action to recover damages
- Reporting to law enforcement authorities
7. Reporting Violations
If you become aware of any violation of this policy, please report it immediately to abuse@secureaccess.io. We take all reports seriously and investigate promptly.