Use cases



Acceptable Use

Acceptable Use

Use of the Services is subject to this Acceptable Use Policy. Capitalized terms have the meaning stated in the applicable agreement between Customer and OneQode.

Customer agrees not to, nor permit any third party to use the Services in any manner, regardless of how remote, that:

  • violates, or encourages the violation of, the legal rights of any individuals or entities;

  • promotes or encourages illegal activity, including child sexual exploitation, child abuse, or terrorism or violence that may lead to death, serious harm, or injury to any individuals;

  • causes the distribution of viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature;

  • facilitates unauthorized access to, disrupts, or impairs the use of the Services, or the equipment used to provide the Services, by customers, authorized resellers, or other authorized users;

  • disables, interferes with or circumvents any aspect of the Services, Software, or the equipment used to provide the Services;

  • generates, distributes, publishes or facilitates unsolicited mass emails, promotions, advertisements, or other solicitations, such as spam;

  • uses the Services, or any interfaces provided with the Services, to host, install, or facilitate the connectivity of virtual private networks (or ‘VPN’), proxy servers, instant messaging, video, voice or text communication applications or servers, torrents or other peer-to-peer file sharing, Tor or onion routing, any distributed Network designed to be inherently censorship resistant, censorship resilient or end-to-end encrypted;

  • uses the Services, or any interfaces provided with the Services, to access any other OneQode product or service in a manner that violates the terms of service of such other OneQode product or service; or

  • for purposes that are unlawful, invasive, infringing, defamatory or fraudulent including Non-consensual Explicit Imagery (NCEI), infringing the intellectual property rights of any individual or entity, phishing, or creating any unethical scheme such as Ponzi or pyramid schemes.