Acceptable Use Policy
Last Updated:
This Acceptable Use Policy ("AUP") defines prohibited uses of VELUM Labs' platform, services, and infrastructure (collectively, "Services"). This AUP is part of our Terms of Service and applies to all users, customers, and anyone accessing our Services.
By using our Services, you agree to comply with this AUP. Violations may result in suspension or termination of access without notice.
1. General Principles
You must use our Services:
- •In a lawful and ethical manner
- •In compliance with all applicable laws, regulations, and these policies
- •With respect for the rights and privacy of others
- •Without causing harm to our infrastructure, services, or other users
- •In accordance with our Terms of Service and Data Processing Agreement
You are responsible for:
- •Your use of the Services and all activities under your account
- •All content, data, and computational jobs you submit or process
- •Ensuring your use complies with applicable laws in your jurisdiction
- •The security and confidentiality of your account credentials
2. Prohibited Activities
Illegal Activities
You may NOT use our Services for any illegal purpose or in violation of any laws, including:
- •Activities that violate criminal laws or regulations
- •Money laundering, fraud, or financial crimes
- •Trafficking of controlled substances or illegal goods
- •Child exploitation or abuse material
- •Terrorism, violent extremism, or related activities
- •Intellectual property infringement or piracy
- •Violations of export control or sanctions laws
- •Identity theft or impersonation
- •Bribery, corruption, or illegal kickbacks
Harmful or Malicious Activities
You may NOT:
- •Upload, transmit, or process malware, viruses, or malicious code
- •Conduct or facilitate cyberattacks, including DDoS attacks
- •Attempt unauthorized access to systems, networks, or accounts (hacking, cracking)
- •Exploit vulnerabilities in our Services or infrastructure
- •Interfere with or disrupt our Services or other users' access
- •Engage in activities that compromise security or integrity of systems
- •Create or distribute ransomware, spyware, or other harmful software
- •Conduct port scanning, network probing, or security testing without authorization
Abuse and Harassment
You may NOT:
- •Harass, threaten, intimidate, or harm others
- •Engage in hate speech or promotion of violence
- •Stalk, dox, or publish private information of others without consent
- •Bully, discriminate, or target individuals based on protected characteristics
- •Create or distribute content promoting self-harm or suicide
- •Engage in sexual harassment or unwanted sexual advances
Privacy Violations
You may NOT:
- •Process Personal Data without lawful basis or necessary consents
- •Violate data protection laws (GDPR, CCPA, LGPD, etc.)
- •Collect or process sensitive Personal Data without appropriate safeguards and explicit consent
- •Use our Services for unauthorized surveillance, tracking, or monitoring of individuals
- •Share, sell, or disclose others' Personal Data without proper authorization
- •Scrape or harvest Personal Data from websites or services without consent
- •Violate individuals' privacy rights or data protection rights
- •Use our Services to de-anonymize or re-identify anonymized data
- •Engage in profiling or automated decision-making that violates privacy laws
- •Process children's data without appropriate safeguards and parental consent
- •Bypass privacy controls or consent mechanisms
- •Use data for purposes beyond what was consented to
Privacy is a core value of VELUM Labs. We take privacy violations extremely seriously and will terminate accounts that violate privacy rights.
3. Intellectual Property Violations
You may NOT:
- •Infringe copyrights, trademarks, patents, or other intellectual property rights
- •Upload or distribute pirated software, media, or content
- •Circumvent digital rights management (DRM) or access controls
- •Use our Services to facilitate intellectual property theft
- •Claim ownership of others' intellectual property
- •Use our trademarks, logos, or branding without authorization
If you believe content on our Services infringes your intellectual property, contact us at legal@velum-labs.com.
4. Spam and Unsolicited Communications
You may NOT use our Services to:
- •Send unsolicited commercial emails (spam)
- •Conduct phishing or spoofing attacks
- •Distribute unsolicited bulk messages or advertisements
- •Harvest email addresses or contact information for spam
- •Facilitate or support spam operations
- •Evade spam filters or authentication mechanisms
5. Prohibited Content
You may NOT upload, process, or distribute:
Illegal Content:
- •Content that violates criminal laws
- •Child sexual abuse material (CSAM)
- •Content depicting extreme violence or gore
- •Content promoting or facilitating illegal activities
Harmful Content:
- •Malware, viruses, or malicious code
- •Content designed to exploit vulnerabilities
- •Content that damages or disrupts systems
Infringing Content:
- •Pirated or unauthorized copyrighted material
- •Content infringing intellectual property rights
- •Counterfeit goods or services
Deceptive Content:
- •Misinformation designed to harm or deceive
- •Impersonation or identity fraud
- •Scams, pyramid schemes, or fraudulent schemes
6. Resource Abuse
Fair Use
You must use computational resources fairly and efficiently:
- •Do not monopolize shared resources
- •Do not conduct activities that degrade performance for other users
- •Comply with usage limits and quotas in your service plan
- •Do not bypass or circumvent usage restrictions
Prohibited Resource Activities
You may NOT:
- •Use our Services for cryptocurrency mining without explicit authorization
- •Conduct benchmark testing or competitive analysis without permission
- •Run computationally intensive tasks solely to consume resources
- •Create multiple accounts to circumvent usage limits
- •Share account credentials to exceed usage allocations
- •Resell or redistribute computational resources without authorization
7. Research and Security Testing
Authorized Research
Security research is valuable. If you wish to conduct security testing:
- •Contact us at security@velum-labs.com before testing
- •Obtain written authorization for testing activities
- •Follow responsible disclosure practices
- •Limit testing to your own account and data
- •Do not access others' accounts or data
- •Do not disrupt Services or cause harm
Bug Bounty Program
We welcome responsible disclosure of security vulnerabilities. For details on our bug bounty program, contact security@velum-labs.com.
Prohibited Testing
You may NOT:
- •Conduct unauthorized security testing or penetration testing
- •Test or probe systems without explicit permission
- •Exploit vulnerabilities for malicious purposes
- •Publicly disclose vulnerabilities without giving us reasonable time to remediate
8. Compliance with Laws
Export Control
Our Services and technology may be subject to export control laws. You agree to:
- •Comply with all applicable export control and sanctions laws
- •Not use our Services in embargoed countries or by restricted parties
- •Not export, re-export, or transfer our technology in violation of law
- •Notify us if you become subject to export restrictions
Regulated Industries
If you operate in regulated industries (healthcare, finance, government), you must:
- •Ensure your use complies with industry-specific regulations
- •Obtain necessary approvals and certifications
- •Implement required security and privacy controls
- •Notify us if special compliance requirements apply
Data Protection
You must:
- •Comply with applicable data protection laws
- •Process Personal Data lawfully and with appropriate safeguards
- •Obtain necessary consents from Data Subjects
- •Respect individuals' privacy rights
- •Honor data protection requests (access, deletion, etc.)
9. Account Responsibilities
Account Security
You must:
- •Keep account credentials confidential and secure
- •Use strong, unique passwords
- •Enable multi-factor authentication (MFA)
- •Notify us immediately of unauthorized access or security breaches
- •Monitor account activity for suspicious behavior
Prohibited Account Activities
You may NOT:
- •Share account credentials with unauthorized individuals
- •Create accounts with false or misleading information
- •Create multiple accounts to evade restrictions or bans
- •Sell, transfer, or rent your account to others
- •Allow unauthorized individuals to use your account
10. Enforcement and Violations
Monitoring
VELUM Labs may:
- •Monitor use of Services for compliance with this AUP
- •Investigate suspected violations
- •Collect and review evidence of prohibited activities
- •Report illegal activities to law enforcement
We do not routinely monitor content due to encryption, but may investigate based on reports or indicators of abuse.
Enforcement Actions
If you violate this AUP, we may:
- •Issue warnings or require corrective action
- •Suspend or limit access to Services
- •Terminate your account and access
- •Remove or disable violating content
- •Report violations to law enforcement or regulatory authorities
- •Pursue legal action for damages
Appeals
If your account is suspended or terminated for AUP violations:
- •Contact us at legal@velum-labs.com to appeal
- •Provide explanation and evidence supporting your appeal
- •We will review appeals in good faith
- •Our decision on appeals is final
11. Reporting Violations
How to Report
If you become aware of AUP violations:
Email: abuse@velum-labs.com
Include:
- •Detailed description of the violation
- •Account or user information (if known)
- •Evidence or documentation (screenshots, logs, URLs)
- •Your contact information for follow-up
Response
We will:
- •Acknowledge receipt of reports
- •Investigate reported violations
- •Take appropriate enforcement action
- •Maintain confidentiality of reporters (where legally permissible)
Protection Against Retaliation
We prohibit retaliation against individuals who report violations in good faith.
12. Third-Party Services
If you integrate third-party services with our platform:
- •Ensure third-party services comply with this AUP
- •You remain responsible for compliance even when using third-party tools
- •Do not use third-party services to circumvent this AUP
- •Review and comply with third-party service terms and policies
13. Changes to This Policy
We may update this AUP to:
- •Address new types of abuse or prohibited activities
- •Reflect changes in laws or regulations
- •Improve clarity and understanding
- •Adapt to evolving security threats
We will notify you of material changes by:
- •Posting the updated AUP on our website
- •Updating the "Last Updated" date
- •Sending email notifications for significant changes
Your continued use of Services after changes constitutes acceptance of the updated AUP.
14. Questions and Contact
If you have questions about this AUP or need clarification on acceptable use:
VELUM Labs
General Inquiries: legal@velum-labs.com
Abuse Reports: abuse@velum-labs.com
Security: security@velum-labs.com
15. Acknowledgment
By using our Services, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy. You understand that violations may result in suspension or termination of access without notice.
Thank you for using VELUM Labs responsibly and ethically.