Skip to content
Control-C
“Because one copy is never enough. Control-C safeguards your Xero ledgers, Cin7 inventory, and XPM workflows, captured, searchable, and recoverable when the cloud isn’t.”
Login
  • Xero Business Login
  • XPM Login
  • Cin7 Omni Login
  • Reseller Login
  • Platform
  • BACKUP & RESILIENCE
    • Xero Business Backup Safeguard ledgers, invoices, and attachments so finance never stops.
    • Xero Practice Manager Backup Protect client records, workflows, and compliance data.
    • Omni Inventory Backup Preserve Cin7 Omni inventory, orders, and billing.
    • Resilience Planning Service Design and rehearse a recovery plan that actually works in real conditions.
  • SOLUTIONS BY ROLE
    • For Businesses Keep finance and operations running when cloud apps fail.
    • For Practices Protect client data, jobs, and firm reputation.
    • For MSPs Deliver reliable recovery across customer systems.
    • For Leaders Plan, test, and oversee true organisational resilience.
    • For Partners Co-create backup and recovery offerings with white-label, strategic, and integration partnerships.
  • Continuity Capabilities
    • Backup Engine Capture every change and keep a clean, trustworthy history you can return to.
    • Recovery Services Restore records, fix mistakes, and keep working even when your SaaS systems fail.
    • Governance & Insight Generate audit-ready evidence, grant safe temporary access, and spot unusual activity.
    • Security & Trust Encryption, isolation, and certified security practices that protect your data end-to-end.
    • Advisory & Partners Workshops, partner dashboards, and guided recovery planning based on your actual data.
  • Plans & Pricing
  • Help Center

Legal

Acceptable Use Policy

Outline service usage guidelines and prohibited behaviors.

Download AUP Report an issue
Legal index
1. Purpose 2. Responsible Use Expectations 3. Prohibited Activities 4. Platform Integrity 5. Security Research and Testing 6. Compliance 7. Enforcement 8. Reporting Issues

1. Purpose

This Acceptable Use Policy (“AUP”) describes activities that are prohibited when accessing or using the Control-C platform, APIs, integrations, and support resources (collectively, the “Service”). The AUP protects our customers, partners, and global infrastructure. Capitalized terms not defined here have the meaning given in the Terms & Conditions.

2. Responsible Use Expectations

  • Maintain accurate account information and restrict access to authorized Users.
  • Configure least-privilege access controls and review entitlements regularly.
  • Promptly notify Control-C of suspected security incidents or credential compromise.
  • Respect rate limits, API usage guidelines, and integration partner policies.

3. Prohibited Activities

You may not, and must not allow third parties to:

  • Upload or transmit malicious code, ransomware, spyware, or other harmful content.
  • Probe, scan, or test the vulnerability of the Service without written authorization from Control-C Security.
  • Interfere with or disrupt the integrity or performance of the Service, including deliberate load testing that bypasses documented limits.
  • Circumvent authentication, access accounts without permission, or share passwords or multi-factor tokens.
  • Use the Service to store or distribute content that is unlawful, defamatory, threatening, harassing, exploitative, hateful, or otherwise objectionable.
  • Engage in fraudulent activity, including payment fraud, phishing, or misrepresentation of affiliation with Control-C or another entity.
  • Upload or process personal data without obtaining required consent or other lawful basis.
  • Violate intellectual property rights or encourage others to do so.
  • Employ the Service for unsolicited marketing, spam, bulk messaging, or open relay operations.

4. Platform Integrity

Automated scripts, bots, and integrations must comply with documented APIs and security requirements. Unauthenticated scraping, data harvesting, or use of the Service for benchmarking without permission is prohibited. Customers must not mask source identity or traffic origin except through approved methods such as Control-C gateway integrations.

5. Security Research and Testing

Control-C values responsible disclosure. Security testing must be conducted through our coordinated vulnerability disclosure program outlined in the Security Overview. Testing outside of approved scope, techniques causing denial-of-service, or exploitation of customer data is strictly prohibited.

6. Compliance

Use of the Service must comply with applicable laws and regulations, including export controls, sanctions, privacy, and employment laws. Customers responsible for regulated workloads (e.g., HIPAA, PCI) must implement supplementary controls described in their governance program.

7. Enforcement

Control-C may investigate violations of this AUP. We may remove content, suspend access, or terminate accounts to protect the Service or comply with legal obligations. Recurring or egregious violations may result in permanent suspension without refund. Control-C may report unlawful activity to appropriate authorities.

8. Reporting Issues

Report suspected violations or abuse to [email protected]. Security issues should be directed to [email protected] with supporting evidence. Include relevant timestamps, IP addresses, and logs when available.

Last updated: March 20, 2025

Control-C wordmark Control-C wordmark
Backup that remembers everything.

Backup Platform

  • How It Works
  • Xero Business Backup
  • Xero Practice Manager Backup
  • Cin7 Omni Backup
  • Governance Extensions (Audit Packs, Zero-Trust, Evidence Tools)

Trust & Security

  • Security Overview
  • Governance Framework
  • Legal & Privacy Center
  • SMB1001 Certification

Ecosystem

  • For Businesses
  • For Practices
  • For MSPs
  • For Leaders
  • Partner Program

Company

  • Vision & Leadership
  • Careers
  • Press & Contact

© Control-C. Backup and recovery for the systems that matter.

Privacy-first. Operating under the SMB1001 Cyber Security Framework: Silver Certified. Contact [email protected].

Control Panel

Manage Your Backups

by Control-C

Create New Account

Already have an account? Login here