Acceptable Use Policy

Effective Date: September 4, 2023
Last Updated: September 12, 2024

This Acceptable Use Policy (“AUP”) describes materials and activities that are allowed and not allowed in the Services. This AUP is not exhaustive, and we reserve the right to take remedial action in connection with content or uses that are not specifically described below. Your purchase, access, or use of any of our Services constitutes your acceptance of this AUP.

Our Terms of Service, Service Level Agreement, Privacy Policy, Cookie Policy, Deprecation Policy, Beta Testing Policy, DMCA Copyright Policy, Trademark Notification Policy, Data Processing Addendum, and Affiliate Program Policy are incorporated into this AUP whenever applicable. Together, they form a binding agreement between you and us. Any capitalized words used but not defined in this AUP have meanings as provided in the Terms of Service.

Your use of the Services constitutes your acceptance of the AUP in effect at the time of your use.

  1. PROHIBITED USE
    You may not use, or facilitate or allow others to use, the Services for any of the following unlawful or abusive purposes:

    1. Illegal Activities. Promoting or encouraging illegal conduct or activities, including the dissemination of any content that is illegal or unlawful in accordance with applicable law or any judicial, regulatory or other governmental order or request.
    2. Harmful Activities. Any use that is deceptive or harmful to others, or that would harm our operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming), deceptively impersonating another person or entity, or engaging in other fraudulent or misleading practices.
    3. Violence, Harassment, or Abuse. Posting content that incites or threatens violence against any person, promotes terrorism, is intended to harass, abuse, or invade the privacy of any individual, creates a risk to the physical safety or health of any individual or to public safety or health, or that threatens or encourages harm on the basis of race, ethnicity, national origin, religion, caste, sexual orientation, sex, gender, gender identity, serious disease or disability, or immigration status. Harassment can be active, in forms including but not limited to unwanted emails, and/or chat messages, and/or verbal declarations on a public forum, and can be passive in the form of defamatory information posted on web sites.
    4. Disruptive Content. Posting or transmitting any content that can generate a great deal of disruption and reaction from the Internet community as a whole. This can include, but is not limited to, material that is considered obscene, offensive, or extremely controversial.
    5. Controlled Substances. Unlawfully selling or distributing controlled substances, including but not limited to any illegal or prescription drugs.
    6. Fraud/False Advertising. Posting or transmitting fraudulent information on or through the Services. This can include false advertising, identity theft, misrepresentation of any kind including phishing, forged email headers and/or fictitious email addresses.
    7. Illegal Adult Content. Posting or hosting any type of illegal adult content, such as child pornography, relates to bestiality, or depictions of nudity or sexual activity obtained or disseminated without the consent of those depicted (e.g., “revenge pornography”). It may include but not be limited to material considered to be pornographic content and images.
    8. Weapons and Firearms. Posting or hosting any type of weapons and firearms. This includes but is not limited to sale of parts/components/kits for weapons and firearms, 3D printed parts, demo videos, and ammunition sales.
    9. Violation of Intellectual Property Rights. Violating, infringing on, or misappropriating the intellectual property or proprietary rights of any third party, including without limitation any rights in or to copyright, patent, trademark, trade secret, privacy or publicity, and publishing content intended to assist others in unlawfully circumventing technical measures intended to protect any such rights. For more information, please see our DMCA Copyright Policy and Trademark Notification Policy.
    10. Reselling or Reconfiguring the Services. Reselling, redistributing, or reconfiguring the Services to allow others to use the Services in an illegal, fraudulent, or inappropriate manner. Interpretation of this clause will be at our sole discretion.
  2. SECURITY VIOLATIONS
    1. System Security. You may not use the Services to violate the security or integrity of any user, network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:
      1. Harmful Software. Posting or hosting content, software, or any other technology that may damage, interfere with, surreptitiously intercept, or expropriate any computer system, program, or data, including any viruses, malware, spyware, adware, Trojan horses, worms, or time bombs.
      2. Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.
      3. Interception. Monitoring of data or traffic on a System without permission.
      4. Falsification of Origin. Using fake or misleading TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route.
      5. Disruption/Hacking. Attempting to disrupt or attacking a System provided by us or any third party (affiliated with us or otherwise). This includes any deliberate attempt to interfere with another user’s ability to take advantage of services offered online. This also includes any effort to secure access to hardware and services without the consent of the provider for those services.
    2. Security Protocols. You agree to strictly and constantly implement the required security protocols and measures against hacking, spamming, worms, malware, Trojans, denial of service attacks, identity theft, unauthorized intrusions and other security-related risks that may impact your systems that use the Services. You agree to also ensure the security protocols are up-to-date using the most recent signatures and definitions.
    3. Security Incident Response. You agree that in the event that you identify or you are informed of any potential security risk or threat against any of your systems that use the Service/s, you will immediately (i) assess, minimize, and limit the scope of the security event, (ii) remove unauthorized data or content related to the security event, and (iii) restore your systems to known safe state and monitor these systems to verify that the threat does not return. Further, you agree to comply with measures required by and any and all rules, regulations, and laws that apply to you, including but not limited to, sending alerts and notifications about the security incident to the affected users of your system and stakeholders, including RAPYD – FZCO.
    4. Cloud Provider. Some of the Systems that we make available to you through the Services may originate from a third-party cloud services provider (“Cloud Provider”). Please read any Cloud Provider agreements as they may be applicable to you. You agree to uphold the agreements of any such Cloud Provider providers to whatever extent they apply to your use of their services and/or our Services. To know more about the agreements enforced by our Cloud provider, please check https://aws.amazon.com/legal/?nc1=f_cc.
  3. NETWORK ABUSE
    You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:

    1. Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled, or other harvesting or scraping of any content of the Services.
    2. Deceitful Actions. Introducing intentionally, knowingly, or recklessly, any virus or other contaminating code into a Service, or collecting, transmitting, or using information, including email addresses, screen names or other identifiers, by deceit or covert means (such as phishing, Internet scamming, password robbery, spidering, and harvesting).
    3. Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, flooding techniques, or conducting a denial of service (“DoS”) attack.
    4. Operation of Certain Network Services. Operating open proxies, open mail relays, open recursive domain name servers, Tor exit nodes, or other similar network services.
    5. Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a System, such as access limits and storage restrictions.
    6. Retaliation Against Us. Any conduct that is likely to result in retaliation against us, including the Services, or our employees, officers, or other agents.
    7. Withholding Identity. Any activity intended to withhold or cloak identity or contact information, including the omission, deletion, forgery or misreporting of any transmission or identification information, such as return mailing and IP addresses.
    8. Mining of Cryptocurrencies. Mining any cryptocurrency, including but not limited to BitCoin or any similar currency, without explicit written permission.
  4. SPAMMING AND OTHER MESSAGE ABUSE
    1. You will not use the Services to collect replies to messages sent from another service provider if those messages violate this AUP or the acceptable use policy of that provider.
    2. You will not use the Services to take any action which directly or indirectly results in any of our IP addresses being listed on any abuse database.
    3. You will implement reasonable measures to secure your devices and networks that use the Services against being used in breach of the applicable laws against spam and unsolicited messages, including where appropriate by the installation of antivirus software, firewall software and operating system and application software patches and updates.
    4. The Services may allow you to manually link Titan Email or another third-party email provider. If you will use a third-party email provider in or with the Services, you agree to comply with the requirements imposed by laws and regulations applicable to emails in your jurisdiction, including not limited to:
      1. not posting or transmitting any unsolicited material through any active medium;
      2. obtaining the consent of your recipients to receive e-mail via some affirmative means, such as an opt-in procedure, honoring revocations of such consent, and notifying recipients of the same;
      3. having a privacy policy or similar disclosure posted for each domain associated with the mailing; and
      4. having the means to collect and address complaints, including anonymous complaints, such as posting an email address for complaints in a conspicuous place on your website.
  5. CONSEQUENCES OF VIOLATION
    1. If we determine, in our discretion, that you have violated this AUP, we may remove, disable access to, or modify any content or resource and/or to suspend or terminate your use of the Services, at any time. We also may intercept or block any content or traffic belonging to you or to users where a Service is being used unlawfully or not in accordance with this AUP. Our right to suspend or terminate your use of the Services applies even if a violation is committed unintentionally or without your authorization. Such right is not an obligation on us to act at any given time or with respect to any given user, and we may exercise such right at any time within our sole discretion.
    2. We reserve the right to seek damages or resort to any and/or all legal remedies against users who abuse, attack, or hack our systems, servers, or the Services or whoever uses the Service in a manner that is contrary to law or our Terms of Service, our Privacy Policy, or this AUP.
  6. OUR MONITORING AND ENFORCEMENT
    1. We reserve the right, but have no obligation, to investigate any suspected violation of this AUP or misuse of the Services. In connection with such investigations, we may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Such reporting may include disclosing, reviewing, and preserving appropriate customer information consistent with applicable law.
    2. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this AUP.
  7. REPORTING OF VIOLATIONS
    1. To report any violation or for more information about this AUP, please email us at [email protected]. Please provide information as completely and accurately as possible. The Services provide a dynamic environment where customers launch and terminate many services over the course of a few hours. This means that customers may occupy the same host or service at different times of the same day. Therefore, it is critical that you identify the IP address(es), date, exact time, and time zone in order for us to accurately identify the reported resource.
    2. We may request your assistance to help stop or remedy the violation.
    3. We may not process or respond to spam or to reports that contain offensive or vulgar language. Threats of harm to us, our personnel, or third parties may be reported to law enforcement.
  8. CONTACT INFORMATION
    1. The Services are owned and operated by Rapyd Cloud, LLC, with business address at 8 The Green #20109, Dover, Delaware, 19901, USA. You may contact us by sending correspondence to the foregoing address or by emailing us at [email protected].