Legal hub

Acceptable Use Policy

Rules for safe and lawful use of Decalyst services.

Effective: May 1, 2026Last updated: May 1, 2026
This legal draft contains required placeholders such as [legal-entity-name] and [support-contact-email]. Replace all [placeholder-type] values with approved legal terms before publication.

1. Prohibited Activity

  • Illegal activity, fraud, phishing, harassment, or exploitation.
  • Malware creation, command-and-control systems, credential theft, or unauthorized intrusion.
  • Use that violates privacy, intellectual property, export controls, or sanctions law.
  • Automated abuse, denial-of-service, spam, or scraping beyond documented limits.
  • Attempts to bypass safety controls, security controls, billing controls, or policy enforcement.

2. Content and Application Safety

  • Do not deploy or distribute harmful, deceptive, or malicious apps through Decalyst services.
  • If you publish public apps, you are responsible for your end-user terms, privacy notices, and legal compliance.
  • Do not host or distribute CSAM, non-consensual intimate content, or credible threats of violence.

3. Security and Vulnerability Behavior

  • No unauthorized testing against systems you do not own or have explicit permission to test.
  • Responsible disclosure is allowed through [security-contact-email].
  • Do not disclose security vulnerabilities publicly before coordinated remediation unless legally required.

4. Enforcement

We may investigate suspected violations and take action including warnings, feature restrictions, suspension, termination, and reporting to authorities where appropriate.

We may preserve logs or evidence to support abuse review and legal obligations.

5. Reporting Abuse

Report violations to [abuse-report-email] or [abuse-report-form-url].