Acceptable Use Policy

This policy defines the permitted and prohibited ways of using the System.

By using the System, the User undertakes to comply with the requirements of this policy.

1. General Requirements

The User is obliged to use the System exclusively for lawful purposes.

The User bears full responsibility for actions performed using the System.

2. Prohibited Actions

The use of the System is prohibited for:

unlawful activities

  • violation of the laws of any jurisdiction
  • distribution of illegal content
  • participation in fraudulent schemes

network attacks

  • DDoS / DoS attacks
  • attempts to hack systems
  • exploitation of vulnerabilities
  • unauthorized access to systems

distribution of malware

  • viruses
  • Trojans
  • spyware
  • ransomware
  • malicious scripts

fraud

  • phishing
  • fraud
  • impersonation
  • social engineering

spam

  • mass messaging
  • email spam
  • spam via website forms
  • automated advertising

illegal data collection

  • collection of personal data without consent
  • scraping of protected resources
  • circumvention of website security systems

3. Usage Restrictions

The User is prohibited from:

  • interfering with the operation of the System
  • attempting to circumvent technical restrictions
  • creating excessive load on the infrastructure
  • using the System in ways that could damage partner networks

4. Response to Violations

Upon detection of violations, the Contractor has the right to:

  • temporarily restrict access
  • block the account
  • terminate the license
  • report the violation to authorized authorities

Blocking may be performed without a refund.

5. Duty to Cooperate

The User is obliged to cooperate with the Contractor in investigating cases of System misuse.

If necessary, the Contractor has the right to request additional information.

6. Policy Changes

The Contractor has the right to change this policy.

The updated version is published on the website.