Acceptable Use Policy

Effective Date: 1/25/2026
Provider: FGCO Holdings LLC, DBA Rhino IT (“Provider”)
Customer: Any entity purchasing or using Services provided by Provider


1. Purpose and Scope

This Acceptable Use Policy (“AUP”) governs Customer access to, and use of all services provided, managed, resold, or supported by Provider (“Services”), including but not limited to:

  • Voice, messaging, and unified communications services

  • Cloud productivity, email, and collaboration services

  • Managed security, monitoring, and threat detection services

  • Managed networks, servers, endpoints, and mobile devices

  • Internet connectivity and related infrastructure

  • Associated software, hardware, and cloud resources

This AUP applies to Customer, its employees, contractors, agents, and any authorized users (“Users”).

Many Services rely on third-party platforms, carriers, licensors, and infrastructure providers. This AUP is intended to flow down acceptable use, security, and compliance obligations imposed on Provider by those third parties.


2. Acceptable Use

Customer and Users may use the Services solely for:

  • Lawful, legitimate business purposes

  • Normal business communications and collaboration

  • Accessing authorized systems, applications, and data

  • Activities consistent with Provider documentation and applicable law

Use of Services must not:

  • Interfere with service integrity or availability

  • Circumvent technical, administrative, or security controls

  • Create unreasonable risk to Provider, third parties, or other customers


3. Prohibited Use

The following activities are strictly prohibited.

3.1 Illegal, Fraudulent, or Abusive Activity

Customer and Users must not use the Services to:

  • Violate any local, state (Missouri), federal, or international law

  • Engage in fraud, impersonation, deception, or social engineering

  • Transmit, store, or distribute illegal content

  • Distribute malware, ransomware, spyware, or other malicious code


3.2 Communications and Voice Services Abuse

Customer and Users must not:

  • Engage in robocalling, auto-dialing, or bulk messaging without proper legal consent

  • Transmit unsolicited, deceptive, or misleading calls or messages

  • Manipulate or falsify caller identification or origin information

  • Engage in call flooding, traffic pumping, or artificial call generation

  • Misuse emergency calling features or provide inaccurate location data


3.3 Cloud, Email, and Collaboration Services Abuse

Customer and Users must not:

  • Send spam, phishing, or mass unsolicited communications

  • Abuse administrative privileges, APIs, or automation

  • Circumvent licensing, usage limits, or security restrictions

  • Improperly access, share, or exfiltrate data

  • Store or distribute prohibited or unlawful content


3.4 Security and Monitoring Interference

Customer and Users must not:

  • Disable, uninstall, or tamper with security or monitoring agents

  • Suppress alerts, logs, or telemetry

  • Interfere with threat detection, isolation, or remediation actions

  • Obstruct investigations or incident response activities

Security services may operate using continuous monitoring and automated response mechanisms.


3.5 Network, Endpoint, and Infrastructure Abuse

Customer and Users must not:

  • Conduct unauthorized scanning, probing, or penetration testing

  • Operate unauthorized public services, relays, or proxy systems

  • Consume bandwidth or resources excessively or abusively

  • Connect unmanaged, non-compliant, or insecure devices to managed environments


4. Customer Responsibilities

Customer is solely responsible for:

  • All actions performed by its Users

  • Enforcing internal acceptable use and security policies

  • User provisioning, access control, and timely offboarding

  • Credential protection, MFA usage, and endpoint hygiene

  • Data classification, retention, and regulatory compliance

Customer agrees to cooperate fully with Provider during investigations, audits, incident response, or compliance activities.


5. Security Requirements

Customer agrees to:

  • Use strong passwords and multi-factor authentication where available

  • Allow Provider-managed tools to remain installed and operational

  • Apply required updates, patches, and configuration changes

  • Maintain accurate contact and emergency service information

  • Promptly report suspected misuse, incidents, or breaches

Failure to meet security requirements may result in service limitations or suspension.


6. Monitoring, Detection, and Disclosure

To maintain service integrity, security, and legal compliance, Provider may:

  • Monitor system logs, traffic patterns, and security telemetry

  • Investigate suspected violations of this AUP

  • Take automated or manual response actions

  • Share information with third parties or authorities when legally required

Customer acknowledges that privacy expectations are limited within managed business systems, subject to applicable law.


7. Suspension and Termination

Provider may, with or without notice:

  • Suspend or restrict Services to mitigate risk

  • Isolate affected systems or Users

  • Terminate Services for material or repeated violations

Customer acknowledges that third-party platforms or infrastructure providers may independently suspend or restrict Services. Provider is not liable for service interruptions resulting from such actions.


8. Third-Party Services and Limitations

Customer acknowledges that:

  • Services depend on third-party platforms, networks, and licensors

  • Provider does not control third-party enforcement decisions

  • Third-party acceptable use and licensing terms apply in parallel

Violations may result in irreversible suspension beyond Provider’s control.


9. Compliance with Law

Customer must comply with all applicable laws and regulations, including U.S. federal and Missouri state laws, communications regulations, and data protection requirements.


10. Policy Updates

Provider may update this AUP as required. Continued use of Services constitutes acceptance of the updated policy.


11. Contact Information

Rhino IT
Springfield, Missouri, USA
Email: support@rhinoitmsp.com



VOIP REGULATORY & COMMUNICATIONS COMPLIANCE ADDENDUM

Effective Date: 1/25/2026
Provider: FGCO Holdings LLC, DBA Rhino IT (“Provider”)

This VoIP Regulatory & Communications Compliance Addendum (“Addendum”) supplements the Master Services Agreement and Acceptable Use Policy. In the event of conflict, this Addendum controls for voice and communications services.


1. Scope

This Addendum applies to all voice and communications services, including:

  • Hosted or cloud-based VoIP services

  • SIP or session-based calling

  • Messaging services (SMS/MMS, where applicable)

  • Emergency calling (E911)

  • Voice-enabled applications and integrations


2. Regulatory Compliance

Customer must comply with all applicable communications laws and regulations, including but not limited to:

  • FCC regulations

  • Telephone Consumer Protection Act (TCPA)

  • TRACED Act

  • Truth in Caller ID rules

  • State and federal consumer protection laws

Violations may result in immediate service suspension without notice.


3. Prohibited Calling and Messaging Practices

Customer and Users must not engage in:

  • Robocalling or auto-dialing without legally valid consent

  • Unsolicited bulk calling or messaging

  • Caller ID spoofing or deceptive origin masking

  • Traffic pumping, call flooding, or artificial call generation

  • Harassing, threatening, or abusive communications

Provider may restrict or suspend traffic that appears abusive, unlawful, or non-compliant.


4. Consent and Recordkeeping

Customer is solely responsible for:

  • Obtaining and maintaining legally sufficient consent

  • Maintaining records of consent, opt-ins, and opt-outs

  • Honoring do-not-call requests and suppression lists

  • Complying with time-of-day and geographic restrictions

Provider does not verify Customer consent practices and assumes no liability for Customer non-compliance.


5. Emergency Calling (E911)

Customer acknowledges that:

  • E911 functionality depends on accurate location data

  • Customer is responsible for maintaining current location information for all endpoints

  • Nomadic and remote users may not have accurate emergency location data

  • Provider is not responsible for failures caused by inaccurate or missing information

Customer agrees to notify Users of E911 limitations.


6. Traffic Monitoring and Enforcement

Provider may:

  • Monitor call patterns and signaling behavior

  • Implement rate limits, blocking, or traffic controls

  • Suspend services immediately upon detection of suspicious activity

  • Cooperate with regulators or law enforcement as required

Certain enforcement actions may be mandatory and non-reversible.


7. Suspension and Irreversible Actions

Customer acknowledges that:

  • Voice services may be suspended or terminated without notice

  • Phone numbers, routing, or access may not be recoverable following enforcement

  • Provider is not liable for damages resulting from regulatory or carrier actions


8. Indemnification

Customer agrees to indemnify and hold harmless Provider from any claims, penalties, fines, or damages arising from:

  • Customer calling or messaging practices

  • Regulatory violations

  • Failure to obtain or document consent

  • Misuse of emergency services

This obligation survives termination.


9. No Legal Advice

Provider does not provide legal advice regarding communications compliance. Customer is responsible for consulting legal counsel as needed.


10. Acknowledgment

By using voice and communications services, Customer acknowledges responsibility for lawful use and regulatory compliance.

© 2026 Rhino I.T. - All rights reserved.