Introduction
At ByteLynk, we are committed to protecting our community and the internet as a whole. This Acceptable Use Policy (AUP) outlines the expectations we have for our customers in using our services responsibly and ethically. This policy also provides clarity on instances where a response from you as a customer is expected. Failure to comply with this policy may result in the suspension or termination of services.
Article 1: Responsible Use of Services
Our services are provided to customers with the expectation that they will be used responsibly. Customers are prohibited from using ByteLynk’s services in any manner that is illegal, harmful, or disruptive to others. This includes but is not limited to:
- Illegal Activities: You may not use our services to engage in any activity that violates local, national, or international law. This includes but is not limited to the distribution of illegal content, hacking, fraud, and intellectual property theft.
- Malicious Activities: You may not use our services to distribute malware, viruses, or other harmful software. Any attempt to compromise the security of our services or others' services, networks, or systems is strictly prohibited.
- Spam and Phishing: The transmission of unsolicited commercial email (spam) or engaging in phishing activities to obtain sensitive information is prohibited. This includes sending bulk emails without proper consent.
- Resource Abuse: You are prohibited from using our services in a manner that negatively affects the performance, security, or availability of our infrastructure. This includes excessive usage of bandwidth, CPU, or other resources that could disrupt service for others.
- Harassment and Abuse: You may not use our services to harass, threaten, or abuse others. This includes stalking, defamation, hate speech, or any activity intended to harm individuals or groups.
Article 2: Prohibited Content
The following types of content are strictly prohibited on ByteLynk’s platform:
- Child Exploitation: Any content that exploits or abuses children, including child sexual abuse material (CSAM), is strictly prohibited.
- Violent Content: Content that promotes, glorifies, or encourages violence, abuse, or harm to individuals, groups, or animals is prohibited.
- Hate Speech: Content that promotes or incites hatred, discrimination, or violence against individuals or groups based on race, religion, ethnicity, gender, sexual orientation, nationality, disability, or any other protected characteristic is not allowed.
- Piracy and Copyright Infringement: Hosting or distributing any content that infringes on the intellectual property rights of others, including pirated software, movies, music, and other media, is prohibited.
- Fraudulent Content: Content that is intended to deceive or mislead others, such as phishing websites, impersonation, fake news, or scams, is strictly prohibited.
- Terrorism-Related Content: Hosting, distributing, or promoting materials related to terrorist activities, recruitment, or extremist propaganda is prohibited.
- Self-Harm and Suicide: Content that promotes or encourages self-harm, suicide, or dangerous activities that could lead to physical harm is not allowed.
- Drug-Related Content: The promotion, sale, or distribution of illegal drugs, controlled substances, or drug paraphernalia is prohibited. Additionally, content promoting the abuse of legal substances is not allowed.
- Weapons and Firearms: Content promoting the illegal sale, distribution, or use of firearms, explosives, or other dangerous weapons is prohibited.
- Gambling and Unlicensed Lotteries: Hosting or promoting illegal gambling activities, unlicensed lotteries, or related fraudulent schemes is prohibited.
- Obscene or Adult Content: Distribution of obscene material, including pornography, is prohibited. This includes any material that violates decency standards or regulations within the jurisdiction of the service.
- Human Trafficking and Exploitation: Any content that supports or is related to human trafficking, slavery, or exploitation of individuals in any form is strictly prohibited.
Article 3: Network and System Security
You are responsible for ensuring that your use of ByteLynk’s services does not jeopardize the security of our network, other users' networks, or the internet at large. Prohibited activities include but are not limited to:
- Unauthorized Access: You may not attempt to gain unauthorized access to any system or network, including probing, scanning, or testing the vulnerability of systems or networks without permission.
- Denial of Service Attacks (DoS): You may not engage in activities that result in denial of service to other users or systems. This includes deliberate overloading of systems or networks.
- Interference: You may not interfere with the proper functioning of any system, including deliberately overloading servers, broadcasting attacks, or other disruptive activities.
Article 4: Compliance, Cooperation, and Response Times
If you are found to be in violation of this Acceptable Use Policy (AUP), ByteLynk reserves the right to take corrective actions, including issuing warnings, suspending services, or terminating your account. The severity of the violation will determine the level of response required from the customer and the actions taken by ByteLynk. Below are the severity levels, illegal activities associated with each level, and the expected response times for customers.
Severity 1 (Critical): Violations that involve highly illegal, dangerous, or malicious activities that pose a significant threat to individuals, the public, or the integrity of our services.
- Examples: Distribution of child sexual abuse material (CSAM), terrorism-related content, human trafficking, large-scale DDoS attacks, or activities that immediately endanger lives or national security.
- Customer Response Time: Immediate response required (within 1 hour of notification).
- ByteLynk Action: Immediate suspension of services, followed by investigation and potential account termination. We may notify law enforcement as appropriate.
Severity 2 (Major): Violations that involve illegal or harmful activities, but do not pose an immediate and significant threat to life, safety, or large-scale service integrity.
- Examples: Distribution of pirated software, fraudulent content, phishing scams, promotion of illegal drugs, or obscene/adult content.
- Customer Response Time: Response required within 12 hours of notification.
- ByteLynk Action: Suspension of the affected service(s) pending investigation. If the issue is not resolved within the response window, services may be further restricted or terminated.
Severity 3 (Moderate): Violations involving unethical or harmful content or actions that negatively impact the user experience or performance of our network but are not illegal on a large scale.
- Examples: Harassment, hate speech, minor resource abuse, gambling without proper licenses, or hosting of unlicensed lotteries.
- Customer Response Time: Response required within 24 hours of notification.
- ByteLynk Action: Warning issued and temporary restrictions may be applied to the account. Continued violations may result in service suspension or termination.
Severity 4 (Low): Violations that involve misuse of resources or breaches of community standards, which do not directly threaten security or violate laws but impact service quality for other users.
- Examples: Excessive bandwidth/resource consumption, spamming, or other minor misuse of services.
- Customer Response Time: Response required within 48 hours of notification.
- ByteLynk Action: Warning issued with instructions for corrective action. Continued non-compliance may result in temporary restrictions, followed by suspension if unresolved.
Customer Responsibilities and Cooperation
- Investigation and Resolution: Upon receiving a notification from ByteLynk about a potential violation, customers are expected to respond promptly based on the severity of the incident. Failure to respond within the given timeframe may result in escalated actions, including suspension or termination of services.
- Communication: Customers are responsible for maintaining accurate contact information with ByteLynk to ensure that they receive important communications about potential violations and security incidents.
- Cooperation with Authorities: In cases involving severe illegal activities, such as CSAM or terrorism-related content, ByteLynk may cooperate with law enforcement agencies. You are expected to cooperate fully with any resulting investigations.
ByteLynk's Actions
- Immediate Actions (Severity 1): For critical violations, ByteLynk will immediately suspend services and report the incident to the appropriate legal authorities.
- Investigation and Review (Severity 2 & 3): For major and moderate violations, services may be suspended while the issue is investigated. During this time, customers are expected to work with ByteLynk to resolve the issue within the specified response time.
- Warnings and Corrections (Severity 4): For low-level violations, ByteLynk will issue a warning and provide instructions for corrective action. Continued non-compliance will result in further restrictions and, eventually, service suspension if unresolved.
Article 5: Reporting Violations
If you become aware of any violation of this AUP, you are encouraged to report it to ByteLynk. Reports of abuse or violations can be sent to our Trust & Safety team at [email protected]. You can also contact us by creating a support ticket with our Trust & Safety team by clicking here, however an account is required.
Last modified on 28/08/2024. For any questions, please contact our Legal Affairs team. Please note that ByteLynk reserves the right to modify these Acceptable Use Policy at its sole discretion, with prior notice.