Acceptable Use Policy
Last Updated: December 19, 2025
This Acceptable Use Policy (“AUP”) governs the permitted and prohibited uses of Pipsqueak Network Scanner (“Pipsqueak,” “we,” “us,” or “our”), a hybrid on‑premises and cloud‑based network scanning and reporting platform operated by Business Technology Solutions Group (BTSG).
This AUP is incorporated by reference into, and must be read in conjunction with, the Terms of Service, Privacy Policy, and Data Processing Addendum (DPA). Capitalized terms not defined here have the meanings set forth in those documents.
By installing, accessing, or using the Services, you agree to comply with this AUP.
1. Purpose of This Policy
Pipsqueak is designed to provide authorized, high‑level network visibility and risk insight for internal IT operations, presales assessments, and managed services engagements.
This AUP exists to: - Prevent unlawful, unethical, or abusive scanning activity - Protect end users, customers, and third parties - Reduce legal, security, and privacy risk for all parties
2. Authorized Use Only
You may use the Services only to scan networks, systems, and environments for which you have explicit, documented authorization from the network owner or an authorized representative.
For Managed Service Providers (MSPs): - Authorization must be obtained prior to each deployment or assessment - Authorization must be consistent with the scope, duration, and purpose of the scan - You are solely responsible for maintaining proof of authorization
Pipsqueak and BTSG do not verify authorization and rely entirely on Customer representations.
3. Prohibited Activities
You may not use the Services to:
3.1 Unauthorized or Unlawful Scanning
Scan networks, devices, or systems without proper authorization
Perform scanning that exceeds the scope granted by the network owner
Use the Services for surveillance, monitoring, or data collection beyond stated purposes
3.2 Offensive Security or Exploitation
Conduct penetration testing, exploitation, or vulnerability weaponization
Attempt to bypass security controls or gain unauthorized access
Use findings to facilitate attacks, extortion, or coercion
3.3 Privacy Violations
Collect personal data without a lawful basis
Use the Services to intentionally capture credentials, communications, or personal files
Use scan data to profile individuals rather than systems or networks
3.4 Misrepresentation and Misuse of Reports
Represent scan results as guarantees, certifications, or regulatory compliance determinations
Use reports in a misleading, deceptive, or fraudulent manner
Alter or remove disclaimers from Pipsqueak‑generated reports
3.5 Platform Abuse
Circumvent licensing, usage limits, or technical safeguards
Reverse engineer, decompile, or tamper with the Services
Introduce malware, malicious code, or harmful payloads
4. Data Handling and Privacy Expectations
You must handle all scan data in accordance with: - Applicable privacy and data protection laws - The Pipsqueak Privacy Policy - Any contractual obligations to your clients or end users
For MSPs: - You act as the data controller for scan data - You are responsible for disclosures, consent, and retention decisions - You must not require Pipsqueak to process data in violation of law
Pipsqueak acts solely as a data processor, as described in the DPA.
5. Deployment and Operational Responsibility
You acknowledge and agree that: - On‑premises components operate in environments you control - You are responsible for secure deployment, configuration, and access controls - You must follow vendor and system owner policies applicable to scanned environments
Pipsqueak is not responsible for: - Misconfigurations - Insecure environments - Customer operational decisions
6. Monitoring, Enforcement, and Suspension
Pipsqueak reserves the right to: - Investigate suspected violations of this AUP - Suspend or terminate access to the Services without notice for violations - Disable Cloud Services where continued use poses legal, security, or reputational risk
Pipsqueak has no obligation to monitor Customer activity and disclaims responsibility for Customer misuse.
7. Consequences of Violation
Violations of this AUP may result in: - Immediate suspension or termination of Services - Termination of licenses granted under the Terms of Service - Legal action or referral to law enforcement where required
Customers remain fully responsible for all actions taken using the Services.
8. Reporting Abuse
If you become aware of misuse of the Services, you must promptly report it to:
Email: [email protected]
9. Changes to This Policy
We may update this AUP from time to time. Continued use of the Services constitutes acceptance of the updated AUP.
10. Contact Information
Business Technology Solutions Group (BTSG)
Product: Pipsqueak Network Scanner
Email: [email protected]

Comprehensive IT infrastructure scanning for security teams and enterprises.
Product
Resources
Company
Legal
© 2025 Pipsqueak. All rights reserved.