Back to Afilo

Acceptable Use Policy

Last updated: January 30, 2025

Effective Date: January 30, 2025

This Acceptable Use Policy ("AUP") defines prohibited uses of the Afilo platform and services provided by TechSci, Inc. By using Afilo, you agree to comply with this policy and all applicable laws and regulations.

1. Prohibited Illegal Activities

You may NOT use Afilo for any illegal purposes, including but not limited to:

  • Fraud: Any fraudulent activity, deception, or misrepresentation
  • Money Laundering: Facilitating or engaging in money laundering activities
  • Terrorism/Extremism: Supporting, promoting, or financing terrorism or violent extremism
  • Malware Distribution: Creating, distributing, or hosting viruses, ransomware, trojans, or other malicious code
  • Hacking: Unauthorized access to computer systems, networks, or data
  • Phishing: Impersonating others to steal credentials or sensitive information
  • Intellectual Property Theft: Piracy, trademark infringement, copyright violation, or patent infringement
  • Identity Theft: Stealing or using another person's identity
  • Drug Trafficking: Facilitating illegal drug sales or distribution
  • Weapons Sales: Illegal sale of firearms, explosives, or weapons
  • Human Trafficking: Any involvement in human trafficking or exploitation

2. Prohibited Abusive Behavior

The following behaviors are strictly prohibited on the Afilo platform:

  • Harassment: Bullying, threatening, or intimidating other users or Afilo staff
  • Hate Speech: Content promoting hatred, discrimination, or violence based on:
    • Race, ethnicity, national origin
    • Religion or religious affiliation
    • Gender, sexual orientation, gender identity
    • Disability or medical condition
    • Age or veteran status
  • Spam: Sending unsolicited bulk messages, commercial advertisements, or repetitive content
  • Impersonation: Pretending to be another person, organization, or Afilo employee
  • Misrepresentation: Providing false, misleading, or deceptive information
  • Stalking: Persistent unwanted contact or monitoring of individuals
  • Doxxing: Publishing private information about individuals without consent

3. System Abuse and Security Violations

You may NOT engage in the following activities:

API and Resource Abuse:

  • Excessive API Calls: Exceeding rate limits defined in your Enterprise Agreement (typically 100 requests/minute)
  • DDoS Attacks: Attempting to overwhelm our systems with traffic
  • Resource Hogging: Using excessive compute, storage, or bandwidth resources
  • Benchmarking: Competitive benchmarking or performance testing without written authorization

Security Circumvention:

  • Bypass Security: Attempting to circumvent authentication, access controls, or encryption
  • Reverse Engineering: Decompiling, disassembling, or reverse engineering our software
  • Vulnerability Exploitation: Exploiting security vulnerabilities for unauthorized access (report to security@techsci.io instead)
  • Credential Sharing: Sharing login credentials or authentication tokens
  • Session Hijacking: Stealing or reusing session tokens

Automated Abuse:

  • Scraping: Automated data scraping or crawling (except via approved APIs)
  • Bot Usage: Automated bot usage for non-approved purposes
  • Account Farming: Creating multiple accounts to abuse free trials or promotions

Responsible Disclosure:

If you discover a security vulnerability, please report it responsibly to security@techsci.io. We offer a bug bounty program for verified vulnerabilities.

4. Prohibited Content

You may NOT upload, store, or share the following types of content:

Illegal Content:

  • Child Exploitation Material (CSAM): Any content involving minors in sexual or exploitative situations (zero tolerance - immediate account termination and law enforcement reporting)
  • Illegal Drugs: Content promoting or facilitating illegal drug sales
  • Weapons: Content facilitating illegal weapons sales
  • Stolen Goods: Content related to stolen property or theft

Adult Content:

  • Pornography: Sexually explicit or pornographic material
  • Adult Services: Escort services, prostitution, or adult entertainment

Violent Content:

  • Violence Promotion: Content promoting, glorifying, or inciting violence
  • Terrorism: Terrorist propaganda or recruitment materials
  • Self-Harm: Content promoting suicide or self-harm
  • Gore: Graphic violence or disturbing imagery (except legitimate medical/educational use)

Fraudulent Content:

  • Scams: Pyramid schemes, Ponzi schemes, or other fraudulent schemes
  • Counterfeit Goods: Fake or counterfeit products
  • False Information: Deliberately false or misleading content causing harm

Rights Violations:

  • Copyright Infringement: Unauthorized copyrighted content (see DMCA section)
  • Trademark Infringement: Unauthorized use of trademarks or brand names
  • Privacy Violations: Content violating others' privacy rights

5. Enterprise-Specific Restrictions

The following restrictions apply to enterprise customers:

  • No Reselling: You may not resell, sublicense, or redistribute platform access without written authorization from Afilo
  • Credential Security: You may not share enterprise credentials outside authorized users listed in your account
  • License Limits: You must not exceed purchased license limits:
    • User seats (number of active users)
    • Storage capacity (GB/TB limits)
    • API call limits (requests per minute/month)
    • Compute resources (processing power)
  • Competitive Use: You may not use Afilo for competitive benchmarking, analysis, or to develop competing products without prior written consent
  • Data Isolation: Agencies and consultants must maintain data isolation between client accounts (no cross-contamination)

6. Data Processing Restrictions

You must comply with the following data restrictions:

  • Privacy Laws: Do not upload data violating privacy laws (HIPAA, CCPA, PIPEDA, etc.) unless you have proper authorization and a signed Data Processing Agreement
  • Unauthorized Personal Data: Do not process personal data without proper legal basis and consent
  • HIPAA Compliance: For healthcare customers:
    • You must have a signed Business Associate Agreement (BAA) before processing PHI
    • Contact hipaa@techsci.io to request BAA
    • Without BAA, do NOT upload Protected Health Information
  • Purpose Limitation: Use data only for stated purposes in your agreement with Afilo
  • EU/EEA Data: As stated in our Privacy Policy, we do not serve EU/EEA customers. Do not process EU/EEA personal data on our platform.

7. Enforcement Actions

Warning System (Progressive Discipline):

First Violation:

  • Written warning via email
  • 48-hour correction period to remedy violation
  • Technical guidance provided if applicable
  • Violation documented in account record

Second Violation:

  • Temporary account suspension (7-30 days depending on severity)
  • Required acknowledgment of AUP before reinstatement
  • Possible account restrictions or monitoring
  • Escalation to account management team

Third Violation:

  • Permanent account termination
  • No refund of remaining subscription balance
  • 30-day data export window (then permanent deletion)
  • Ban from creating new Afilo accounts

Immediate Termination (No Warning):

The following violations result in IMMEDIATE account termination:

  • Illegal Activities: Any illegal activity (reported to law enforcement)
  • Security Threats: Hacking attempts, malware distribution, DDoS attacks
  • CSAM: Any child exploitation material (reported to NCMEC and law enforcement)
  • Terrorism: Terrorism-related activities or content
  • Fraud: Fraudulent activity or financial crimes
  • Extreme Violence: Extreme violations threatening safety or causing harm

Investigation Process:

  • We reserve the right to investigate suspected AUP violations
  • We may access account data as necessary for investigation (with notice unless legally prohibited)
  • We may suspend accounts pending investigation to protect other users and system integrity
  • You must cooperate with investigations (failure to cooperate may result in termination)

Appeal Process:

  1. Submit appeal to appeals@techsci.io within 14 days of enforcement action
  2. Include:
    • Account email
    • Copy of violation notice
    • Detailed explanation of circumstances
    • Evidence supporting your appeal
  3. Review completed within 10 business days
  4. Decision is final (no further appeals)

8. Reporting AUP Violations

How to Report:

If you become aware of AUP violations by other users:

  1. Email: abuse@techsci.io
  2. Include in Your Report:
    • Your contact information (optional for anonymity, but helpful for follow-up)
    • Account or user engaging in violation (if known)
    • Detailed description of the violation
    • Evidence: screenshots, URLs, timestamps, email headers, etc.
    • Specific AUP section being violated
    • Impact or harm caused (if applicable)
  3. Response Timeline:
    • Acknowledgment within 24 hours
    • Investigation within 3-5 business days
    • Action taken (if warranted) within 7 business days

Protection for Reporters:

  • We do not retaliate against good-faith reporters of AUP violations
  • Reporter identity kept confidential (except where legally required to disclose)
  • False reports made in bad faith may result in account action against the reporter

9. Copyright Infringement (DMCA)

Afilo complies with the Digital Millennium Copyright Act (DMCA). We respond to valid copyright infringement notices.

Designated DMCA Agent:

TechSci, Inc. - DMCA Agent

Email: dmca@techsci.io
Mailing Address:
TechSci, Inc. - DMCA Agent
1111B S Governors Ave STE 34002
Dover, DE 19904, United States

DMCA Notice Requirements (per 17 U.S.C. ยง 512(c)):

To file a valid DMCA takedown notice, include:

  1. Physical or electronic signature of copyright owner or authorized agent
  2. Identification of copyrighted work claimed to be infringed
  3. Identification of infringing material (URL or specific location in our system)
  4. Your contact information (address, phone number, email)
  5. Statement of good faith belief that use is unauthorized
  6. Statement of accuracy under penalty of perjury that you are authorized to act

Our Response:

  • We will investigate within 3 business days
  • We will remove/disable access to allegedly infringing material upon valid notice
  • We will notify the user who posted the content
  • User may submit counter-notice per DMCA procedures

Repeat Infringers:

Accounts with 3 or more valid DMCA complaints will be permanently terminated.

Trademark Infringement:

Report trademark infringement to legal@techsci.io with:

  • Proof of trademark ownership (registration certificate)
  • Description of infringement and location
  • Contact information

10. User-Generated Content Responsibility

You are solely responsible for all content you upload, create, or share via the Afilo platform.

  • Afilo is not responsible for user-generated content
  • We reserve the right to remove content violating this AUP without prior notice
  • We do not actively monitor all user content
  • Automated systems may flag potentially violating content for review
  • We respond to user reports and legal requests

Content Backup:

We are not responsible for backing up your content. Maintain your own backups. Deleted content may be unrecoverable after 90 days.

11. Changes to This Policy

We may update this Acceptable Use Policy at any time to reflect new threats, legal requirements, or service changes. Material changes will be notified via email with 14 days' notice. Continued use after changes constitutes acceptance.

12. Contact Information

General Questions:

support@techsci.io

Report AUP Violations:

abuse@techsci.io

Copyright (DMCA):

dmca@techsci.io

Legal/Trademark:

legal@techsci.io