Acceptable Use Policy (AUP)
This Acceptable Use Policy outlines the rules, ethical responsibilities, and legal standards that govern the use of our remote access and IT management products, including GoMyid and GoMyit.
The purpose of this policy is to ensure that all users operate the software in a lawful, transparent, secure, and fully authorized manner.
By using our platform, you agree to the guidelines described in this document and acknowledge your responsibility to protect user privacy, maintain data integrity, and avoid any misuse of remote access technology.
1. Purpose of This Policy
The objective of this policy is to define acceptable and unacceptable usage of GoMyid / GoMyit. Remote access software, by its nature, has the potential to be misused if not managed responsibly.
Therefore, it is essential that every user, administrator, and organization adheres to the standards outlined in this policy. The AUP ensures legal compliance, protects individuals from unauthorized activity,
and creates a safe operational environment for all remote sessions. This document is a core part of our commitment to transparency, safety, and responsible digital interaction.
2. Scope of the Policy
This Acceptable Use Policy applies to every individual and organization interacting with our software. This includes:
- Administrators who configure and manage the system
- Employees who use company devices with GoMyid installed
- Contractors and outsourced IT personnel
- End users receiving remote assistance
- Any party who remotely connects to a device through the platform
The entire usage lifecycle—from installation to remote access to session termination—is governed by this policy.
Compliance is mandatory, regardless of region, jurisdiction, company size, or device ownership.
3. Core Principles of Acceptable Use
GoMyid is built on a foundation of privacy, transparency, and ethical responsibility.
To maintain safety and legal compliance, all users must observe the following core principles:
- Transparency: The software must never be used covertly or in hidden mode to access someone’s device.
- User Consent: Remote sessions require clear, informed, and voluntary approval from the device owner/user.
- Security: Secure authentication (passwords, access keys) and strong encryption must be used at all times.
- Lawfulness: All activities must comply with privacy laws, cybersecurity regulations, and corporate policies.
- Integrity: Users must not manipulate, alter, or delete data unless authorized.
- Accountability: All remote access must be traceable and linked to a known authorized operator.
4. Acceptable and Authorized Use Cases
GoMyid / GoMyit is designed exclusively for ethical and legitimate business purposes.
Some acceptable and appropriate use cases include:
- Providing IT support to corporate devices, servers, and user workstations.
- Managing large-scale enterprise infrastructures from a central IT department.
- Delivering remote technical assistance to customers who explicitly request help.
- Monitoring corporate-owned devices for compliance, security, and maintenance.
- Supporting remote workforce operations in secure business environments.
- Conducting scheduled administrative tasks with documented permission.
These activities must always be aligned with organizational policies and legal requirements.
Users must document their actions and maintain transparent communication with device owners.
5. Prohibited Activities
To protect individuals and organizations, the following activities are strictly forbidden. Violating these rules may result in account termination, legal consequences, or loss of licensing rights.
- Installing the software without the device owner’s full knowledge and consent.
- Using the software for covert surveillance, spying, stalking, or tracking behavior.
- Accessing personal devices (phones, laptops, home PCs) without written permission.
- Recording screens, files, or user actions without authorization.
- Intercepting passwords, private conversations, or sensitive information.
- Modifying system settings, files, or applications without approval.
- Running the software in stealth or invisible mode to avoid detection.
- Using the system to harass, harm, intimidate, or pressure any individual.
- Deploying GoMyid for government surveillance without legal approval or a court order.
- Violating GDPR, KVKK, CCPA, HIPAA, or other international privacy laws.
6. Corporate Devices vs. Personal Devices
6.1 Use on Corporate-Owned Devices
Organizations may legally install GoMyid on corporate-owned devices as part of their internal IT policies.
Employees should be informed that their work machines may be monitored or accessed remotely,
provided that the organization has a clear and transparent usage policy.
Such installations must comply with labor regulations and privacy laws.
6.2 Use on Personally-Owned Devices
The software may only be installed on personal devices when the individual owner gives explicit, voluntary, and informed consent.
No employer, company, or third party may install GoMyid on a personal device without receiving direct permission from the owner.
7. User Responsibilities
To maintain a secure and ethical software environment, all users must:
- Protect their login credentials and avoid sharing passwords.
- Use remote access only when necessary and authorized.
- Report suspicious or unauthorized activities immediately.
- Ensure devices remain protected with updated security tools.
- Follow company policies and applicable legal frameworks.
8. Administrator Responsibilities
Administrators hold higher responsibility levels due to their elevated access rights. They must:
- Ensure all users receive clear information about remote access operations.
- Configure systems to enforce secure authentication and encryption.
- Document all administrative actions for auditing purposes.
- Limit access only to personnel who require it.
- Respond quickly to misuse reports or security alerts.
9. Legal Compliance Requirements
Users must comply with global privacy regulations. This includes but is not limited to:
- GDPR (Europe)
- KVKK (Türkiye)
- CCPA (California)
- HIPAA (USA health sector)
- ePrivacy Directive
- Computer Fraud and Abuse Acts
Failure to comply may result in legal action, financial penalties, or revocation of access to the software.
10. Enforcement and Violation Consequences
Violations of this AUP may result in:
- Immediate suspension of software access
- Permanent termination of the user account
- Revocation of licensing rights
- Internal corporate disciplinary action
- Legal action by affected individuals or authorities
11. Reporting Abuse or Misuse
Users may report violations of this policy by contacting our security department.
All reports are investigated confidentially, and corrective actions are taken promptly.
12. Final Statement
This Acceptable Use Policy exists to protect all parties, ensure legal compliance,
and maintain an ethical framework for remote access operations.
By using GoMyid / GoMyit, you acknowledge and accept this policy and agree to use the software responsibly, transparently, and with respect for individual rights.