Acceptable Use Policy

Last updated: December 2024

Web services offered by XORS Software (the "Services") can be used by many people over the age of 18 on the internet. In exchange, we trust you to use our services responsibly and in compliance with local law and United States law.

This Acceptable Use Policy (this "Policy") describes prohibited uses of the web services offered by XORS Software. The examples described in this Policy are not exhaustive.

If you use XORS services, you are also beholden to our Terms of Service and Privacy Policy.

We may modify this Policy at any time by posting a revised version on the Services. By using the Services, you agree to the latest version of this Policy. If you violate the Policy or authorize or help others to do so, we may suspend or terminate your use of the Services without notice.

Be respectful of the people and communities that are using the Services. We all have different perspectives. That's what is beautiful about the internet and creativity: communities of varying types can assemble and flourish. Let's build useful products and applications for all.

Enforcement

We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Services.

Because you may store data through the Services, we may be held accountable for what you do with your data. Therefore, we may look at what you do with your data outside of the API service. We are not responsible for what others do with your data on the Internet.

Therefore, we may:

  • Investigate violations of this Policy or misuse of the Services
  • Remove, disable access to, or modify any content or resource that violates this Policy
  • Revoke your access permanently to Services and remove any retrievable data from our servers

Human Rights

Do not do anything that violates ours or someone else's rights, including intellectual property rights (examples of which are copyright, trademarks, confidential information, and goodwill), personality rights, unfair competition, privacy, and data protection rights.

No Illegal, Harmful, or Offensive Use or Content

You must use the Services lawfully and for a lawful purpose. You may not use, or encourage, promote, facilitate, or instruct others to use, the Services for any illegal, harmful, fraudulent, infringing, or offensive use, or to transmit, store, display, distribute, or otherwise make available content that is illegal, harmful, fraudulent, infringing, or offensive.

You will not upload data that violates local or United States law.

Prohibited activities or content include:

  • Illegal, Harmful, or Fraudulent Activities. Any activities that are illegal, violate the rights of others, or may be harmful to others, our operations, or reputation, including disseminating, promoting, or facilitating child pornography, child sexual abuse material, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming.
  • Hate Speech. Content that calls for violence, exclusion, or segregation. This includes serious attacks on people based on their race, ethnicity, national origin, religion, sex, gender identity, sexual orientation, disability, serious medical conditions, caste, or immigration status.
  • Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others.
  • Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable.
  • Dangerous Content. Content that contains illegal drugs or illegal drug paraphernalia, firearms, weapons, or any goods whose sale, possession, or use is subject to prohibitions or restrictions.
  • Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.
  • Falsified Content. Content that contains false or misclassified reports, or otherwise abuses our reporting system.

No Doxing

Unless you have clear and documented written consent, you may not share an individual's private information or aggregate their public information for the purpose of intimidating them through harassment.

Do not upload content that contains or refers to anyone else's personal data or private or confidential information. This includes telephone numbers, location information, names, identity documents, email addresses, log-in credentials, security questions, financial information including bank account and credit card details, biometric data, and medical records.

No Security Violations

You may not use the Services to violate the security or integrity of any network, computer, or communications system, software application, or network or computing device.

Prohibited activities include:

  • Circumventing Limits. Circumventing storage space limits or rate limits.
  • Unauthorized Access. Accessing or using any system without permission, including attempting to probe, scan, or test the vulnerability of a system or to breach any security or authentication measures.
  • Interception. Monitoring of data or traffic on a system without permission.
  • Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route.
  • Impersonation. Impersonating a network operator, administrator, moderator, or maintainer is strictly forbidden.

No Network Abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. You may not probe, scan, or test the vulnerability of any system or network.

Prohibited activities include:

  • Monitoring or Crawling. Monitoring or crawling of a system that impairs or disrupts the system being monitored or crawled.
  • Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
  • Intentional Interference. Interfering with the proper functioning of any system, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
  • Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a system, such as access and storage restrictions.

No Email or Other Message Abuse

You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like "spam"), including commercial advertising and informational announcements.

You will not alter or obscure mail headers or assume a sender's identity without the sender's explicit permission.

Contact

If you have any questions about this Policy, please contact us at support@xors.xyz.