This banner can be used to inform vistors of something important.
Learn more
Platform
PLATFORM
Free Business VPN
Get a free business VPN with a virtual security center for up to 100 users.
Software-defined Perimeter
Make your infrastructure invisible to the prying eyes of non-authorized personnel.
Business VPN
Full-featured business VPN. Super-easy. Cloud-delivered.
Secure Web Gateway
Shield your organization from web-based threats.
Zero Trust Network Access
Create a zero trust network with no expert skills needed.
Remote access VPN
Safeguard remote access to your private network in 10 minutes.
CASE STUDY - AMX13
Check client story
Features
FEATURES
Dedicated VPN gateway
Static IP address
Central dashboard
Zero-trust access control
DNS filtering
Multi-factor authentication
Network access control
Split tunneling
Access logs
IP whitelisting
SSO
CASE STUDY - AMX13
Check client story
Customers
Resources
Resources
Product tour
Events & webinars
Blog
Support portal
INTEGRATIONS
Azure
Okta
Google Workspace
Wordpress
Explore all
DOWNLOAD APP
Chrome OS
Mac
Android
Windows
Browse all
Company
company
About us
Partners
Careers
Affiliate
Newsroom
Contact us
HOW SECURE IS GOODACCESS
Learn more
CASE STUDY - AMX13
Check client story
Pricing
Create Free Account

Acceptable Usage Policy of GoodAccess VPN Services

Last updated and valid from 24 January 2022.

If you are accessing to or using the GoodAccess Cloud VPN or related services (together “Services”) as provided by GoodAccess s.r.o., a Czech company with Id. 03513386 (“GoodAccess” or “we”), you must comply with this Acceptable Usage Policy:  

  • You must not use the Services for any illegal or unethical activity or in breach of good manners and fair conduct norms. In particular, you must not use the Services in breach of intellectual property rights of other persons. You should know that copying and distributing (including uploading) of movies and pictures without obtaining a proper license is illegal in many jurisdictions.  
  • You must not use the Services for uploading, downloading or otherwise transmitting or storing any illegal content and, irrespective of whether such content is legal or illegal, you must not use the Services for transmitting or storing of:
  • ‍child pornography,
  • any content supporting or promoting racism or other discrimination, extremism or any criminal activities, including terrorism,
  • ‍malware, viruses and other malicious content,
  • any content which is harmful, threatening, abusive, harassing, defamatory, hateful or discriminatory,
  • ‍personal data or confidential information without being properly entitled to do so.
  • You must not use the Services to attack or threaten other individuals or entities whether psychologically, physically or electronically.
  • You must not use the Services for any mass emailing, bulk emailing or sending of unsolicited messages, in particular for marketing purposes.  
  • You must keep your login details for the Services confidential and secure and you must not allow any other party to use the Services with your login details.
  • If you have admin rights to the Services, you must not create User accounts without being authorized to do so by the customer (“Customer”), who is a party to the contract with us governing the Services which you administer. While creating the User account, you must comply with the Terms of Use as available from https://www.goodaccess.com/legal (“Terms”).
  • You must not resell, sublicense or otherwise allow other parties to use the Services, or offer the same, whether for fees or other consideration or without consideration, except as permitted under the Terms.
  • You must not attempt to reverse engineer any GoodAccess software provided as part of the Services or other components used therein or assist anyone else in doing so.
  • You must not excessively use the Services in a way which is detrimental to us or other Users, in particular after we notify you that a particular way of use is detrimental.


List of Sub-processors

Last updated and valid from 24 January 2022.

There are currently no Sub-processors as referred to in the Data Processing Agreement between GoodAccess s.r.o., a Czech company with Id. 03513386, and a Customer using the GoodAccess Cloud VPN or related services.

GoodAccess Logo white

In GoodAccess, we invest our passion into developing a cybersecurity platform that is easy to deploy, easy to manage, and easy to use.

Education
VPN with Static IP Explained
What is Business Cloud VPN
What is IP Whitelisting
DNS Filtering Explained
Zero Trust Network Access
35+ Gateways Worldwide
How secure is GoodAccess
Compliance Made Easy
Platform
Free business VPN
Business VPN
Zero trust network access
Software defined perimeter
Secure web gateway
Remote access VPN
Features
Dedicated VPN gateway
Static IP address
Central dashboard
Zero-trust access control
DNS filtering
Multi-factor authentication
Network access control
Split tunneling
Access logs
IP whitelisting
SSO
Resources
Product tour
Blog
Events & webinars
Support portal
Customers
Integrations
Company
About us
Become a partner
Become an affiliate
Careers
Newsroom
Contact us
Partner
Sign up form
Pricing
Plans
Small teams
Starter
Download App
iOS
Mac
Android
Windows
Chrome OS
Linux script

Copyright ©2023
GoodAccess

Facebook icon LinkedIn iconTwitter icon
Acceptable Usage Policy
Term & Conditions
Privacy Policy