Acceptable Use Policy
Last Updated: 2025-11-23
If you have any questions about this document, please contact us at legal@vekora.dev.
Introduction
Section titled “Introduction”This Acceptable Use Policy (“Policy”) outlines the prohibited uses of the services (“Service”) provided by Vekora. This Policy is an integral part of our Terms of Service. By accessing or using our Service, you agree to abide by the restrictions listed below.
Prohibited Activities
Section titled “Prohibited Activities”You may not use the Service to engage in, foster, or promote illegal, abusive, or irresponsible behavior, including but not limited to:
-
Illegal or Harmful Use
- Unlawful Activities: Violating any applicable local, state, national, or international laws or regulations.
- Harmful and Objectionable Content: Hosting, distributing, or linking to pornographic or obscene material; extremist content; or content that offends common decency. This includes child sexual abuse material (CSAM) and material that could seriously endanger the morals of children or young people.
- Gambling: Hosting or facilitating online gambling, gaming of chance, or similar activities.
- Violence and Hate Speech: Promoting terrorism, violence, or inciting hatred against individuals or groups based on protected attributes.
- Phishing & Fraud: Hosting phishing sites, deceptive impersonation, or engaging in fraudulent schemes.
-
System Abuse and Network Interference
- Service Integrity: Attempting to crash, overload, or interfere with the Service’s operations (e.g., Denial of Service attacks).
- Cryptocurrency Prohibition: Any use of the Service for cryptocurrency mining, farming, plotting, or related blockchain activities is strictly prohibited. This is a zero-tolerance restriction required by our underlying infrastructure partners.
- Resource Abuse: Using the Service for proxying or other resource-intensive tasks not intended for the platform, unless explicitly authorized in your plan.
- Bypassing Limitations: Attempting to circumvent quotas, storage limits, or usage restrictions placed on your account.
-
Message Abuse (Spam)
- Sending unsolicited bulk communications (email, SMS, etc.).
- Using the Service to host datasets or software used for “scraping” or harvesting email addresses without consent.
Security and Vulnerabilities
Section titled “Security and Vulnerabilities”You may not use the Service to distribute malware, viruses, trojan horses, or other malicious code.
- Vulnerability Testing: Unauthorized penetration testing or scanning of our network is strictly prohibited. If you are a security researcher acting in good faith, please refer specifically to our Bug Bounty Policy and Security Policy for authorization guidelines and reporting procedures.
Intellectual Property and Privacy
Section titled “Intellectual Property and Privacy”- Copyright: You may not use the Service to infringe upon the intellectual property rights of others. Please refer to our Copyright Policy for details on how we handle infringement claims.
- Personal Data: You are responsible for ensuring your use of the Service complies with applicable data privacy laws. Please refer to our Privacy Policy and Data Processing Agreement for details on data handling obligations.
Enforcement
Section titled “Enforcement”We reserve the right to investigate any violation of this Policy. If we determine that you have violated this Policy, we may remove, disable access to, or modify any content or resource and may suspend or terminate your account without prior notice.
Updates to this Policy
Section titled “Updates to this Policy”We may modify this Policy from time to time. Continued use of the Service constitutes acceptance of the modified Policy.