Skip to main content
Macly
Get Started
Legal

Terms of Service

Last updated:

Welcome to Macly. These Terms of Service ("Terms") govern your use of our Mac rental services. By using our services, you agree to these Terms. Please read them carefully before using our platform.

1. Acceptance of Terms

By accessing and using Macly's services, you agree to be bound by these Terms of Service and all applicable laws and regulations.

If you do not agree with any of these terms, you are prohibited from using or accessing our services.

We reserve the right to modify these terms at any time. Your continued use of the service following any changes constitutes acceptance of the new terms.

2. Service Description

Macly provides cloud-based Mac rental services, offering access to dedicated Mac mini hardware for development, testing, and production purposes.

Our service includes remote access to physical Mac hardware, technical support, and secure infrastructure.

Service availability is subject to technical limitations and maintenance requirements.

3. User Accounts

You must provide accurate, complete, and current information during registration and maintain the accuracy of such information.

You are responsible for safeguarding your account credentials and for all activities that occur under your account.

You must notify us immediately of any unauthorized use of your account or any other breach of security.

Users must be at least 18 years old or have parental consent to use our services.

4. Acceptable Use Policy

You agree not to use the service for any illegal or unauthorized purpose, including but not limited to copyright infringement, distribution of malware, or conducting illegal activities.

You may not use the service to mine cryptocurrency or run any form of distributed computing without explicit permission.

You shall not attempt to gain unauthorized access to any portion of the service or any other systems or networks.

Content that violates local, state, national, or international law is strictly prohibited.

5. Payment Terms

All fees are quoted in USD unless otherwise specified and are subject to change with notice.

Payment is due upon receipt of invoice or as per the agreed billing cycle.

You authorize us to charge your selected payment method for all fees incurred.

All sales are final unless otherwise specified in our refund policy.

6. Service Level Agreement

We strive to maintain 99.9% uptime for our services, excluding scheduled maintenance.

Scheduled maintenance will be communicated in advance when possible.

We do not guarantee uninterrupted or error-free service and will not be liable for any service interruptions.

Credits for downtime may be available as per our SLA policy.

7. Data and Privacy

You retain all rights to your data. We claim no ownership over content you create using our service.

We will not access your data except as necessary to provide the service or as required by law.

Upon termination of service, all data will be securely deleted within 30 days unless retention is required by law.

You are responsible for maintaining backups of your important data.

8. Intellectual Property

The Macly service, including its original content, features, and functionality, is owned by Macly and is protected by international copyright, trademark, and other intellectual property laws.

You may not copy, modify, distribute, sell, or lease any part of our services or included software.

You grant us the right to use your company name and logo for marketing purposes unless you opt out in writing.

9. Limitation of Liability

Macly shall not be liable for any indirect, incidental, special, consequential, or punitive damages resulting from your use of or inability to use the service.

Our total liability shall not exceed the amount paid by you for the service in the past twelve months.

We do not warrant that the service will meet your specific requirements or that defects will be corrected.

10. Indemnification

You agree to indemnify and hold harmless Macly, its affiliates, and their respective officers, directors, employees, and agents from any claims, damages, losses, and expenses arising from your use of the service.

This includes any violation of these terms or any applicable law or regulation.

11. Termination

Either party may terminate this agreement at any time with written notice.

We reserve the right to terminate or suspend your account immediately, without prior notice, for any violation of these Terms.

Upon termination, your right to use the service will immediately cease.

All provisions which by their nature should survive termination shall survive.

12. Governing Law

These Terms shall be governed by and construed in accordance with the laws of the jurisdiction in which Macly operates.

Any disputes arising from these terms shall be resolved through binding arbitration.

You waive any right to a jury trial in any proceeding arising out of or related to these Terms.

13. Device Management & MDM Compliance

All Mac hardware provided through our service is managed via Mobile Device Management (MDM) protocols. These protocols are essential for security, maintenance, and service integrity.

You are strictly prohibited from attempting to bypass, disable, remove, or otherwise interfere with the MDM profiles and protocols installed on any device provided to you. This includes, but is not limited to, modifying system settings, using third-party tools, or performing factory resets to circumvent MDM controls.

Any unauthorized attempt to tamper with MDM protocols constitutes a severe security and usage violation and will result in immediate suspension of your account and server access.

If a violation requires our data center team to perform manual, physical intervention to recover the server, a penalty fee of $49 will be applied to your account.

If your actions result in a complete loss of access or hardware lockout requiring hardware replacement or advanced recovery, a penalty fee of $699 will be applied to your account.

Following an MDM violation, your account will remain suspended until you provide a formal written explanation. Reactivation of your account and server access will be at our sole discretion based on your explanation.

Repeated violations of this policy may result in permanent termination of your account without refund.

14. Security Research & Disk Encryption Policy

Macly welcomes responsible security research conducted in good faith. However, all security testing activities on Macly-provided hardware must be conducted only after obtaining explicit prior written authorization from Macly's security team. Unauthorized security testing of any kind is strictly prohibited and will be treated as a violation of these Terms.

Partial or full disk encryption of Macly-provided hardware is strictly prohibited without prior written authorization from Macly. This prohibition applies regardless of the purpose, including but not limited to security research, penetration testing, vulnerability assessment, or personal data protection.

The term "disk encryption" as used in this section includes, but is not limited to: Apple FileVault (full-disk encryption), APFS volume-level encryption, third-party encryption software (e.g., VeraCrypt, BitLocker via Boot Camp), creation of encrypted disk images or containers, encrypted partitions or volumes, any software or hardware-based encryption mechanism that restricts access to the storage medium, and any modification to the boot process that requires a decryption key or passphrase to access the system.

Disk encryption on shared rental hardware poses severe operational risks: it can render the device permanently inaccessible to Macly's management infrastructure, disable MDM (Mobile Device Management) protocols, prevent remote recovery and re-provisioning, cause irreversible loss of access to the physical hardware, and require costly manual intervention at the data center including potential hardware replacement.

Any user found to have enabled partial or full disk encryption without prior written authorization will face immediate and permanent termination of their account and all associated services. This termination will occur without prior warning and is non-reversible.

In the event of unauthorized disk encryption, the following financial penalties will apply: (a) a minimum penalty fee of $699 for hardware recovery and re-provisioning; (b) additional charges for any physical data center intervention required, billed at actual cost; (c) if the encryption renders the hardware permanently unusable or requires full hardware replacement, the user will be liable for the full replacement cost of the affected hardware, up to $2,499 per device.

Upon termination due to unauthorized disk encryption: (a) no refund will be issued for any remaining subscription period, prepaid credits, or unused services; (b) all data on the device will be considered forfeited, and Macly bears no obligation to recover, back up, or return any user data; (c) any outstanding penalty fees will be charged to the payment method on file or pursued through collections if necessary.

Macly reserves the right to pursue legal action against any user whose unauthorized disk encryption activities result in: (a) damage to or destruction of Macly hardware; (b) disruption to Macly's services or infrastructure; (c) costs exceeding the applicable penalty fees; or (d) any activity that constitutes a violation of applicable computer fraud, unauthorized access, or data protection laws.

Security researchers who wish to conduct authorized testing, including activities that may involve disk encryption, must: (a) submit a detailed written request to [email protected] describing the scope, methodology, and duration of the proposed testing; (b) receive explicit written approval from Macly's security team before commencing any testing; (c) confine all testing activities strictly to the approved scope; (d) report all discovered vulnerabilities through Macly's responsible disclosure program; and (e) not disclose any findings publicly until Macly has had a reasonable opportunity to address them.

Macly may, at its sole discretion, grant limited exceptions to the disk encryption prohibition for verified security researchers who have completed the authorization process described above. Any such exception will be documented in writing, will specify the exact scope and duration of the permitted activities, and may be revoked at any time.

15. Prohibited Network Activities: Proxy, Tunnel & Relay Services

The use of Macly-provided hardware to operate, host, or facilitate any form of proxy server, network tunnel, traffic relay, VPN endpoint, or similar network intermediary service is strictly prohibited. This includes, but is not limited to: SOCKS proxies, HTTP/HTTPS proxies, reverse proxies, SSH tunnels, WireGuard/OpenVPN endpoints, Shadowsocks, V2Ray, Trojan, Cloudflare Tunnel, ngrok, frp (Fast Reverse Proxy), and any other software or configuration that routes, forwards, redirects, or relays network traffic through Macly-provided hardware.

This prohibition applies regardless of whether the proxy, tunnel, or relay service is intended for personal use, commercial resale, circumvention of geographic restrictions, or any other purpose. The operation of such services on shared rental infrastructure poses severe security, legal, and operational risks, including potential abuse for illegal activities, network degradation for other users, and exposure to legal liability.

Any user found to be operating, hosting, or facilitating proxy, tunnel, or relay services on Macly-provided hardware will face immediate and permanent termination of their account and all associated services. This termination will occur without prior warning and is non-reversible. No refund will be issued for any remaining subscription period, prepaid credits, or unused services.

Macly actively monitors network traffic patterns to detect proxy, tunnel, and relay activity. Automated detection systems may flag suspicious traffic patterns, and flagged accounts will be reviewed and subject to immediate termination upon confirmation of a violation.

Macly reserves the right to pursue legal action against any user whose proxy, tunnel, or relay activities result in: (a) damage to Macly's network infrastructure or reputation; (b) legal liability for Macly due to illegal activities routed through its hardware; (c) disruption of service for other Macly users; or (d) any activity that constitutes a violation of applicable telecommunications, cybersecurity, or data protection laws.

16. Contact Information

For any questions regarding these Terms of Service, please contact us through our support channels.

Legal notices should be sent to our registered business address.

We aim to respond to all inquiries within 48 business hours.

Effective Date

These Terms of Service are effective as of and supersede all prior versions.