Legal hub

Abuse Reporting and Takedown Policy

How to report phishing, malware, fraud, policy abuse, and harmful content.

Effective: May 1, 2026Last updated: May 1, 2026
This legal draft contains required placeholders such as [legal-entity-name] and [support-contact-email]. Replace all [placeholder-type] values with approved legal terms before publication.

1. What to Report

  • Phishing, malware, scams, spam, or fraud.
  • Content that violates law or Decalyst policy.
  • Abusive use of hosted apps, share links, APIs, or integrations.
  • Impersonation, account takeover attempts, or suspicious behavior.

2. Where to Report

  • Abuse email: [abuse-report-email]
  • Abuse web form: [abuse-report-form-url]
  • Emergency security channel: [security-contact-email]

3. Required Report Details

  • Reporter contact and organization (if applicable).
  • URL, project ID, username, or other identifiers.
  • Description of the issue and timeline.
  • Evidence such as screenshots, logs, or headers where available.

4. Review Process

We review reports, may request additional details, and may take actions including warning, removal, suspension, or account termination.

For urgent safety threats, we may act immediately before completing full correspondence.

5. Law Enforcement and Child Safety

We may escalate credible threats or legally required reports to appropriate authorities.

Suspected CSAM or child exploitation material may be reported to relevant hotlines and agencies as required by law.