HubStor Inc.

HubStor Acceptable Use Policy (AUP)


This Acceptable Use Policy (the “AUP”) specifies various requirements and restrictions for the responsible use of the HubStor service (collectively, the “Service”) provided by HubStor and/or its affiliated companies and subsidiaries (collectively, “Company”, “us” or “we”). The purpose of the AUP is to specify the type of actions and content that are contrary to our mission and philosophies as well as to specify guidelines for your use of the Service.


Company shall have the right at any time to modify this AUP by giving you not less than 60 days’ notice to you by email to the email account we have on file for you and the latest version will be available on the HubStor website at:  Any such modifications shall be solely for the purpose of providing for changes in either legislation or good industry practice.  The date of last revision of this AUP is indicated at the bottom of the document.  You may withhold your consent to any such modification during such 60 day period, provided that you do not do so unreasonably, failing which you shall be deemed to have accepted such modifications.


When using the Service it is your responsibility to comply with the AUP and to ensure that you are adhering to all applicable laws, rules, regulations, and commonly accepted practices of the Internet community.  The prohibited uses described below are intended as guidelines regarding improper and inappropriate conduct, and should not be interpreted as an exhaustive list.

Company does not provide any guarantees regarding, and assumes no liability for, the security and integrity of any data or information you store or transmit via the Service or the Internet, including any data or information stored or transmitted by any computer designated as "secure." Customers of the Service shall report to Company any issue that could compromise the security or integrity of the Service or anyone using or providing capabilities for the Service as soon as reasonably practicable.


(i) The Service is intended to store, index, manage and make available unstructured data to a customer’s designated users, end users and any external user that customer provides with access to such data (eg. via the HubStor file sharing feature).

(ii) Intended uses of the Service include:

(a) Viewing, tagging, retrieving and/or sharing by a User of the content that the User has created and/or migrated and which is stored on the Service;

(b) Administration by a Customer of information relating to its data stored on the Service, including, without limitation, the information management policies, metadata, access rights, configuration settings, and other such options and features; and

(c) Viewing, downloading, modifying by a Customer of reports, alerts, and other compiled data stored and/or generated on or through the Service.


(i) Transmission, distribution, retrieval or storage of any data or other material through or via the Service that are viruses, Trojan horses, worms, time bombs, cancel bots, or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data, or personal information.

(ii) Attempting to gain unauthorized access to an account or computer resource not belonging to you and/or purposely altering or forging your identity is prohibited.  Sending any message or transmitting any electronic communication using a name or address other than your own for purposes of deception is prohibited.  Impersonating someone else by altering your source IP address or by using forged headers or other identity information is prohibited. Fraudulently concealing, forging or otherwise falsifying your identity in connection with any use of the Service is prohibited.  Engaging in any activities that may interfere with the ability of others to access or use the Service or the Internet (e.g. denial of service attacks) is prohibited.  Monitoring any data, information or communications on any network or system (including the Service) that is not owned by you or without authorization is prohibited.


Customer may need to install certain Company software in order to use the Service.  If so, the following terms apply:

HubStor Software License Terms

Customer may install and use the software only for use with the Service. The Service-specific terms set out in the subscription agreement or other order documentation with HubStor may limit the number of copies of the software Customer may use or the number of devices on which Customer may use it. Customer’s right to use the software begins when the Service is activated and ends when Customer’s right to use the Service ends. Customer must uninstall the software when Customer’s right to use it ends. HubStor may disable it at that time. For greater certainty, Customer must not decompile, disassemble or otherwise attempt to reverse engineer any software provided for use of the Service or attempt to install the software outside the agreed on-premises environment or installation location.

Third-party Software Components

The software may contain third party software components. Unless otherwise disclosed in that software, Company, not the third party, licenses these components to Customer under Company’s license terms and notices.


If you become aware of any violation of this AUP by any person, including Users or third parties, you must notify Company via e-mail at as soon as reasonably practicable or through your designated Account Manager at Company.

    • Related Articles

    • How to Install and Configure the HubStor Connector Service (HCS)

      If you have access to the HubStor Admin Portal, you can download the HubStor Connector Service installer by going to 'Administration' and then 'Tools & Utilities'. Step 1 -- Run the Installer Open the HCS installer file ...
    • Overview of a Connector Write Policy

      This article will describe the purpose of a Connector Write Policy and options within it.  The Write Policy is what tells the connector which data to capture.  Below is a view of the Write Policy tab.   Within this policy are the following 3 ...
    • Overview of a Connector Delete Policy

      This article describes the purpose of a Connector Delete Policy, which is found on the properties of a connector.   It is highly recommended to take precautions when using a Delete Policy.  As indicated, this policy is deleting original source data.  ...
    • Overview of the HubStor Connector Service (HCS)

      The HCS is software that is deployed behind your firewall to provide policy-based archiving to your HubStor cloud tenant. The HCS runs on a Windows VM, uses a service account, and can be installed and configured in minutes. With the HCS installed, ...
    • How to Interpret HubStor Invoices

      First, thank you for being a HubStor customer! This article shows you how to dissect and reverse engineer the numbers in a HubStor invoice. Before we walk through a few examples, here are some essentials you need to know: HubStor invoices are posted ...