1. Allowed Use
Use services only for lawful business, personal, educational, or development workloads aligned with applicable law. ✅
2. Abuse Is Forbidden
Spam, harassment, fake identity campaigns, social engineering, and deceptive communication are strictly prohibited. 🚫
3. No Illegal Activity
Zero tolerance for illegal activity: malware, phishing, fraud, carding, unauthorized access, data theft, or attacks. ⛔
4. Network Integrity
Do not run scripts or traffic patterns that overload shared systems, DNS, APIs, or core network services. 🌐
5. Enforcement
Policy violations may result in immediate suspension, evidence collection, law-enforcement cooperation, and termination. 📌
6. Report Abuse
Please report abuse with timestamp, source, and evidence so our operations team can act quickly. 📮
Illegal or harmful activity is not tolerated under any circumstance.
