This policy defines the permitted and prohibited ways of using the System.
By using the System, the User undertakes to comply with the requirements of this policy.
1. General Requirements
The User is obliged to use the System exclusively for lawful purposes.
The User bears full responsibility for actions performed using the System.
2. Prohibited Actions
The use of the System is prohibited for:
unlawful activities
- violation of the laws of any jurisdiction
- distribution of illegal content
- participation in fraudulent schemes
network attacks
- DDoS / DoS attacks
- attempts to hack systems
- exploitation of vulnerabilities
- unauthorized access to systems
distribution of malware
- viruses
- Trojans
- spyware
- ransomware
- malicious scripts
fraud
- phishing
- fraud
- impersonation
- social engineering
spam
- mass messaging
- email spam
- spam via website forms
- automated advertising
illegal data collection
- collection of personal data without consent
- scraping of protected resources
- circumvention of website security systems
3. Usage Restrictions
The User is prohibited from:
- interfering with the operation of the System
- attempting to circumvent technical restrictions
- creating excessive load on the infrastructure
- using the System in ways that could damage partner networks
4. Response to Violations
Upon detection of violations, the Contractor has the right to:
- temporarily restrict access
- block the account
- terminate the license
- report the violation to authorized authorities
Blocking may be performed without a refund.
5. Duty to Cooperate
The User is obliged to cooperate with the Contractor in investigating cases of System misuse.
If necessary, the Contractor has the right to request additional information.
6. Policy Changes
The Contractor has the right to change this policy.
The updated version is published on the website.