skip to content
Are you looking for support from US? GET SUPPORT
Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or sign in again before proceeding.

Acceptable Use Policy

Last Updated: Aug 14, 2023

This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“you”, “your”, “yours”, or “Customer”) using any products, including software, documentation, and services, including hardware-as-a-service, provided by Motorola Solutions, Inc. or any of its subsidiaries or affiliates (“Products and Services”) and any user of the Products and Services , including anyone interacting with any Products and Services provided by Customer (“Authorized User”). For purposes of this AUP, Motorola Solutions, Inc. together with its subsidiaries and affiliates will be referred to as "Motorola". The prohibited conduct in this AUP is not exhaustive. Customer is responsible for its Authorized Users’ compliance with this AUP.  If Customer or any Authorized User violates this AUP, Motorola may suspend Customer’s use of the Products and Services. This AUP may be updated by Motorola from time to time upon reasonable notice, which may be provided via Customer’s account, e-mail, or by posting an updated version of this AUP at https://www.motorolasolutions.com/en_us/about/legal/motorola-solutions-customer-terms/acceptable-use-policy.html. Use of the Products and Services is subject to this AUP.

Inappropriate Content. Do not use the Products and Services to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, or objectionable, including, but not limited to, content or communications which Motorola determines (a) is false or inaccurate; (b) is hateful or encourages hatred or violence against individuals or groups; or (c) could endanger public safety. This prohibition includes use of the Products and Services by a hate group. Customer and its Authorized Users are also prohibited from using the Products and Services to promote, transmit, or access any prohibited content or communications described in this AUP.

Prohibited Activities. Do not use the Products and Services to engage in or encourage any activity that is illegal, deceptive, harmful, a violation of others’ rights, or harmful to Motorola’s business operations or reputation, including:

●   Violations of Laws. Violating laws, regulations, governmental orders, industry standards, or supplier’s requirements, use policies, or guidance in any applicable jurisdiction (“Applicable Laws”), including any of the foregoing that require (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications; or (b) compliance with opt-out requests for any data or communications. Without limiting the foregoing, these include:

○  violating, or encouraging the violation of, the legal rights of others;

○  engaging in, promoting or encouraging illegal activity, including child sexual exploitation, child abuse, false imprisonment, slavery, terrorism or violence that can cause death, serious harm, or injury to individuals or groups of individuals;

○  any unlawful, invasive, infringing, defamatory or fraudulent purpose including Non-consensual Explicit Imagery (NCEI), violating intellectual property rights of others, phishing, or creating a pyramid scheme;

○  generating, distributing, publishing or facilitating unsolicited mass email, promotions, advertisements, or other solicitations, e.g. spam; or

●  Interference with the Products and Services. Interfering with, disabling, circumventing or otherwise negatively impacting any aspect of the Products and Services or any third-party networks, products or services that are linked to the Services, or the equipment used to provide the Products and Services.

●  Reverse Engineering; Modifying; Copying; Selling. Reverse engineering, copying, disassembling, reprograming, deriving source code, or decompiling the Products or Services.  Modifying, creating derivative works of, or merging the Products or Services with other products or services.  Copying, reproducing, distributing, lending, or leasing the Products or Services for or to any third party without authorized written permission from Motorola. Taking any action that would cause the Products or Services to be placed in the public domain. Using the Products or Services to compete with Motorola.  Removing, altering, or obscuring, any copyright or other notice. Distributing, sublicensing, selling, or exporting the Products and Services or permitting any third party to do so without authorized written permission from Motorola.

●  Falsification of Identity or Origin. Illegally creating a false identity or attempting, except in cases of a legitimate investigation, to mislead others as to the identity of the sender or the origin of any data or communications.

●  Service Integrity Violations. Violating the integrity of the Products and Services, including:

○  Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Products or Services.

○  Security Vulnerabilities. Finding security vulnerabilities to exploit the Products and Services or attempting to bypass any security mechanism or filtering capabilities.

○  Disabling the Products and Services. Committing denial of service (DoS) attacks on the Products and Services or any other conduct that attempts to disrupt, disable, or overload the Products and Services.

○  Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses, malware, worms, Trojan horses, corrupted files, hoaxes, or using automated means, such as bots, to gain access to or use the Products and Services.

○  Unauthorized Access. Attempting to gain unauthorized access to the Products and Services or related systems or networks; allowing others, including Authorized Users, to make the Products and Services available for use by unauthorized third parties, including via a commercial rental or sharing arrangement. Sharing user credentials (including among authorized users).

○  Security Risk.  Posing a security or other risk or adverse impact to any software, Motorola, Motorola’s systems, or any third party (including other Motorola customers).

Data Safeguards. Customer is responsible for determining whether the Products and Services offer appropriate safeguards for Customer’s use of the Products and Services, including, but not limited to, any safeguards required by Applicable Laws, prior to transmitting or processing, or prior to permitting Authorized Users to transmit or process, any data or communications via the Products and Services.

Third-Party Flowdowns. Additional requirements for specific products and services that are purchased from Motorola, but provided, or otherwise made available, by a third party are set forth at https://www.motorolasolutions.com/en_us/about/legal/motorola-solutions-customer-terms/flow-down-terms.html and apply to the extent Customer uses those specific third-party products and services.

Violations of the AUP. Violations of this AUP, including any prohibited content or communications, may be reported to your Sales Manager. Customer agrees to immediately report any violation of this AUP to Motorola and provide cooperation, as requested by Motorola, to investigate and/or remedy that violation.