Acceptable Use Policy

Last Updated: December 19, 2025 

This Acceptable Use Policy (“AUP”) governs the permitted and prohibited uses of Pipsqueak Network Scanner (“Pipsqueak,” “we,” “us,” or “our”), a hybrid on‑premises and cloud‑based network scanning and reporting platform operated by Business Technology Solutions Group (BTSG). 

This AUP is incorporated by reference into, and must be read in conjunction with, the Terms of Service, Privacy Policy, and Data Processing Addendum (DPA). Capitalized terms not defined here have the meanings set forth in those documents. 

By installing, accessing, or using the Services, you agree to comply with this AUP. 

 

1. Purpose of This Policy 

Pipsqueak is designed to provide authorized, high‑level network visibility and risk insight for internal IT operations, presales assessments, and managed services engagements. 

This AUP exists to: - Prevent unlawful, unethical, or abusive scanning activity - Protect end users, customers, and third parties - Reduce legal, security, and privacy risk for all parties 

 

2. Authorized Use Only 

You may use the Services only to scan networks, systems, and environments for which you have explicit, documented authorization from the network owner or an authorized representative. 

For Managed Service Providers (MSPs): - Authorization must be obtained prior to each deployment or assessment - Authorization must be consistent with the scope, duration, and purpose of the scan - You are solely responsible for maintaining proof of authorization 

Pipsqueak and BTSG do not verify authorization and rely entirely on Customer representations. 

 

3. Prohibited Activities 

You may not use the Services to: 

3.1 Unauthorized or Unlawful Scanning 

  • Scan networks, devices, or systems without proper authorization 

  • Perform scanning that exceeds the scope granted by the network owner 

  • Use the Services for surveillance, monitoring, or data collection beyond stated purposes 

3.2 Offensive Security or Exploitation 

  • Conduct penetration testing, exploitation, or vulnerability weaponization 

  • Attempt to bypass security controls or gain unauthorized access 

  • Use findings to facilitate attacks, extortion, or coercion 

3.3 Privacy Violations 

  • Collect personal data without a lawful basis 

  • Use the Services to intentionally capture credentials, communications, or personal files 

  • Use scan data to profile individuals rather than systems or networks 

3.4 Misrepresentation and Misuse of Reports 

  • Represent scan results as guarantees, certifications, or regulatory compliance determinations 

  • Use reports in a misleading, deceptive, or fraudulent manner 

  • Alter or remove disclaimers from Pipsqueak‑generated reports 

3.5 Platform Abuse 

  • Circumvent licensing, usage limits, or technical safeguards 

  • Reverse engineer, decompile, or tamper with the Services 

  • Introduce malware, malicious code, or harmful payloads

4. Data Handling and Privacy Expectations 

You must handle all scan data in accordance with: - Applicable privacy and data protection laws - The Pipsqueak Privacy Policy - Any contractual obligations to your clients or end users 

For MSPs: - You act as the data controller for scan data - You are responsible for disclosures, consent, and retention decisions - You must not require Pipsqueak to process data in violation of law 

Pipsqueak acts solely as a data processor, as described in the DPA. 

 

5. Deployment and Operational Responsibility 

You acknowledge and agree that: - On‑premises components operate in environments you control - You are responsible for secure deployment, configuration, and access controls - You must follow vendor and system owner policies applicable to scanned environments 

Pipsqueak is not responsible for: - Misconfigurations - Insecure environments - Customer operational decisions 

 

6. Monitoring, Enforcement, and Suspension 

Pipsqueak reserves the right to: - Investigate suspected violations of this AUP - Suspend or terminate access to the Services without notice for violations - Disable Cloud Services where continued use poses legal, security, or reputational risk 

Pipsqueak has no obligation to monitor Customer activity and disclaims responsibility for Customer misuse. 

 

7. Consequences of Violation 

Violations of this AUP may result in: - Immediate suspension or termination of Services - Termination of licenses granted under the Terms of Service - Legal action or referral to law enforcement where required 

Customers remain fully responsible for all actions taken using the Services. 

 

8. Reporting Abuse 

If you become aware of misuse of the Services, you must promptly report it to: 

Email: [email protected] 

 

9. Changes to This Policy 

We may update this AUP from time to time. Continued use of the Services constitutes acceptance of the updated AUP. 

 

10. Contact Information 

Business Technology Solutions Group (BTSG) 
Product: Pipsqueak Network Scanner 
Email: [email protected] 

Comprehensive IT infrastructure scanning for security teams and enterprises.

Product

Resources

Company

© 2025 Pipsqueak. All rights reserved.