Spyrix logo

Software

Phone Tracker

Mac

Support

Company

Spyrix logo

Software

Phone Tracker

Phone Tracker

Parental Control

Parental Control

Mac

Sign up

Acceptable User Policy

Date: December 19, 2025

Purpose

This Acceptable Use Policy (AUP) defines the permitted and prohibited uses of Spyrix monitoring software ("Spyrix"). The purpose of this policy is to ensure that Spyrix is used responsibly, ethically, and in full compliance with applicable laws and organizational standards.

Scope

This policy applies to all individuals or organizations who install, configure, manage, or access data generated by Spyrix, including but not limited to:

  • Employers

  • Parents/guardians

  • System administrators

  • Any authorized monitoring personnel

This policy covers all devices on which Spyrix is installed, including company-owned computers, employee workstations, and devices used by minors under parental supervision.

Acceptable Use

Users may use Spyrix only for lawful and authorized purposes, including:

  • Monitoring employee activity on organization-owned devices to ensure productivity, security, and policy compliance.

  • Monitoring minors' devices for child safety, parental supervision, and online protection.

  • Protecting organizational assets from security threats, data loss, or unauthorized access.

  • Conducting internal investigations within the boundaries of applicable laws and internal HR/compliance procedures.

All monitoring should be:

  • Transparent when legally required (e.g., employee notification policies)

  • Proportionate to the legitimate business or parental supervision need

  • Securely handled, with all collected data protected from unauthorized access

Prohibited Use

Users may NOT:

  • Install Spyrix on a device they do not own or do not have lawful monitoring authority over.

  • Use Spyrix for covert surveillance of adults without informed consent, where required by law.

  • Monitor personal accounts, passwords, banking information, or sensitive personal communications unless explicitly permitted.

  • Use Spyrix for stalking, harassment, blackmail, or any abusive behavior.

  • Monitor employees on their personal devices unless explicit written consent is provided.

  • Intercept communications or data in violation of privacy or wiretapping laws.

  • Share, sell, or misuse captured data for any unauthorized purpose.

Any use of Spyrix that violates privacy laws, employment regulations, or data-protection requirements is strictly prohibited.

Data Security & Confidentiality

Users must:

  • Store Spyrix-generated data securely using encryption or other approved protection methods.

  • Restrict access to monitoring logs and reports to authorized personnel only.

  • Delete collected data when it is no longer necessary for its original purpose.

  • Ensure compliance with data-retention and privacy regulations (e.g., GDPR, CCPA where applicable).

User Notification Requirements

Where required by jurisdiction, users must:

  • Notify employees in writing that monitoring may occur

  • Communicate the scope, purpose, and nature of monitoring activities

  • Ensure policies are acknowledged and stored for compliance

Parents/guardians using Spyrix for child safety monitoring are encouraged to communicate monitoring practices appropriately based on the child's age and maturity.

Monitoring Limitations

Spyrix should not be used to:

  • Record audio, video, or keystrokes in private locations where individuals have a reasonable expectation of privacy.

  • Collect unnecessary personal data unrelated to business or safety purposes.

  • Perform continuous surveillance when less intrusive methods would suffice.

Enforcement

Violations of this AUP may result in:

  • Revocation of Spyrix access

  • Termination of organizational privileges

  • Disciplinary action (if applicable)

  • Civil or criminal liability for unlawful monitoring

  • Reporting to legal authorities

Acknowledgment

By installing or using Spyrix, the user acknowledges:

  • They understand and agree to this Acceptable Use Policy.

  • They accept full responsibility for ensuring the Software is used legally and ethically.

  • They agree to comply with all applicable local, state, national, and international laws.