Acceptable Use Conditions of swebify.io
Last updated: March 28, 2025
1. Introduction
1.1 Scope
This Acceptable Use Policy ("AUP") is an integral part of the Swebify Terms and Conditions ("Terms") and defines the permitted and prohibited activities when using the Swebify platform and related services (collectively, the "Service").
1.2 Acceptance
By using the Service, you agree to comply with this AUP. If you are acting on behalf of a company or other legal entity, you represent that you have the authority to bind such entity to this AUP.
1.3 Changes
We reserve the right to modify this AUP at any time. Substantial changes will be notified via email at least 15 days prior to taking effect. Continued use of the Service after such changes constitutes acceptance of the new AUP.
2. Prohibited Activities
2.1 Illegal or Harmful Content
You may not use the Service to store, publish, transmit, distribute, or make available content that:
- a) Is illegal or facilitates illegal activities under applicable laws;
- b) Infringes on third-party intellectual property rights, including copyrights, trademarks, patents, or trade secrets;
- c) Is defamatory, libelous, fraudulent, or misleading;
- d) Is obscene, pornographic (especially involving minors), violent, or promotes discrimination;
- e) Contains viruses, malware, ransomware, or other harmful code;
- f) Is designed to gain unauthorized access to systems or networks;
- g) Violates others’ privacy, including unauthorized publication of personal data.
2.2 System Activities
You may not use the Service to:
- a) Interfere with, compromise, or disrupt the integrity or performance of the Service or the data it contains;
- b) Attempt unauthorized access to the Service, other accounts, or connected systems/networks;
- c) Scan or test vulnerabilities without explicit written permission;
- d) Bypass authentication or security measures;
- e) Intentionally overload the infrastructure with excessive requests or data;
- f) Disrupt monitoring or measuring systems;
- g) Launch “denial of service” attacks on any system or network.
2.3 Messaging and Communications
You may not use the Service to:
- a) Send spam, unsolicited marketing messages, or bulk communications;
- b) Send emails or messages with forged or masked sender identities;
- c) Harvest email addresses or contact information without consent;
- d) Distribute malware, phishing, or harmful content via email;
- e) Conduct unauthorized telephony or SMS operations;
- f) Violate acceptable use policies of ISPs or third-party hosting providers.
2.4 System Resources and Usage Limits
You must respect the following resource usage limits:
- a) CPU: CPU usage must not exceed 80% of the allocated capacity for extended periods (over 15 minutes);
- b) Memory: Memory usage must stay within your subscribed plan allocation;
- c) Storage: Storage usage must remain within plan limits. Files must not be used for unrelated general-purpose storage;
- d) Network: Network traffic must remain reasonable and not cause congestion or interfere with other users;
- e) Processes: The number of simultaneous processes must be reasonable to avoid degrading system performance;
- f) Database: Database queries must be optimized and must not place excessive load on the system.
2.5 Resale or Redistribution of Services
Unless expressly authorized through a partnership agreement or white-label license, you may not:
- a) Resell, distribute, or provide third-party access to the Service;
- b) Build a competing hosting or cloud service using our Service;
- c) Operate unauthorized “free” or “freemium” hosting services using the Service.
3. Legal and Regulatory Compliance
3.1 Privacy and Data Protection
You must use the Service in compliance with all applicable privacy and data protection laws, including the EU General Data Protection Regulation (GDPR), where applicable.
3.2 Industry Regulations
If you operate in a regulated sector (e.g., healthcare, finance, education), you are responsible for ensuring your use of the Service complies with applicable regulations such as HIPAA, PCI-DSS, SOX, FERPA, etc.
3.3 Export Controls
You must comply with all applicable export control and economic sanctions laws and regulations.
3.4 Children and Minors
The Service is not intended for use by children under the age of 16. If you collect data from minors through the Service, you must comply with all applicable child data protection laws.
4. Security
4.1 Credential Management
You are responsible for:
- a) Keeping all login credentials confidential;
- b) Using strong and unique passwords for each account;
- c) Enabling multi-factor authentication where available;
- d) Immediately notifying us of any security breach or unauthorized use.
4.2 Application Security
If you host applications using the Service, you are responsible for:
- a) Keeping all software, frameworks, and third-party libraries up to date;
- b) Promptly fixing any identified vulnerabilities;
- c) Implementing proper security measures in your code;
- d) Regularly testing your application’s security.
4.3 Threat Monitoring and Reporting
You must:
- a) Monitor your resources for suspicious or unauthorized activities;
- b) Promptly report any security incidents that may affect the Service;
- c) Cooperate with us during investigations into security breaches;
- d) Share relevant threat information that may affect other users.
5. White-Label and End-User Services
5.1 Responsibility Toward End-Users
If you use Swebify's white-label feature to serve end-users, you are responsible for:
- a) Ensuring your end-users comply with this AUP;
- b) Including terms of service and acceptable use policies in your agreements that are at least as strict as this AUP;
- c) Responding promptly to abuse reports involving your users;
- d) Terminating access for users who repeatedly violate this AUP.
5.2 Transparency and Communication
When using the Service in white-label mode, you must:
- a) Clearly inform your users that the technical service is provided by Swebify, even if branded under your name;
- b) Avoid misleading claims about infrastructure ownership or technology;
- c) Promptly inform your users of any service issues, maintenance, or outages that affect them.
6. Resource Limits and Fair Usage
6.1 Fair Usage Policy
Our service operates under a "fair usage" policy that includes:
- a) Reasonable limits on API operations per time period;
- b) Restrictions on network traffic, storage operations, and computational resources;
- c) Restrictions on automated processes that could impact shared infrastructure performance.
6.2 Plan-Specific Limits
Each subscription plan includes specific resource limits detailed in the Service documentation. Consistently or significantly exceeding these limits may result in:
- a) Temporary performance throttling;
- b) Temporary suspension of specific features;
- c) Requirement to upgrade to a higher plan;
- d) Additional charges for over-usage, if applicable.
6.3 Usage Monitoring
We continuously monitor resource usage to ensure fairness and optimal performance for all users. We provide tools for you to:
- a) View your current and historical resource usage;
- b) Set alerts when usage approaches the defined limits;
- c) Analyze usage patterns to optimize resource consumption.
7. Enforcement of the AUP
7.1 Monitoring and Investigation
We reserve the right to:
- a) Monitor compliance with this AUP while respecting your privacy and data confidentiality;
- b) Investigate potential AUP violations, either proactively or in response to third-party complaints;
- c) Request your cooperation and information to investigate suspected violations.
7.2 Actions in Case of Violation
In case of a violation of this AUP, we may, at our discretion:
- a) Issue a warning;
- b) Temporarily suspend specific features or services;
- c) Temporarily suspend the entire account;
- d) Permanently terminate the account in case of severe or repeated violations;
- e) Charge additional fees for resources used in violation of limits;
- f) Take legal action if necessary.
7.3 Notification Procedure
In case of a violation, we will notify you via the primary email associated with your account. The notice will include:
- a) The nature of the violation;
- b) Actions required to remedy the violation;
- c) Timeline for implementing corrective actions;
- d) Consequences of failing to remedy the issue.
7.4 Appeals Procedure
If you believe your activity was wrongly flagged as a violation of this AUP, you may:
- a) Request a review by contacting our support team with a detailed explanation;
- b) Provide documentation or evidence supporting your case;
- c) Request a meeting with a member of our compliance team.
8. Reporting Violations
8.1 How to Report Violations
If you become aware of any content or activity that violates this AUP, we encourage you to report it immediately via:
- a) Email: [email protected]
- b) through the ticket area of swebify.io
8.2 Information Required
When reporting a potential violation, please provide:
- a) Detailed description of the suspected violation;
- b) Date and time of the incident;
- c) Identification of affected resources or content (URL, resource ID, etc.);
- d) Any evidence supporting the report;
- e) Your contact information (optional but helpful for clarification).
8.3 Whistleblower Protection
We are committed to protecting the identity of individuals who report violations in good faith. We will not tolerate retaliation against those who report legitimate violations of this AUP.
9. Final Provisions
9.1 Severability
If any provision of this AUP is deemed unenforceable or invalid, such provision will be limited or eliminated to the minimum extent necessary, so the remaining provisions remain in full force and effect.
9.2 No Waiver
Our failure to enforce any right or provision of this AUP shall not constitute a waiver of such right or provision.
9.3 Interpretation
In case of conflict between this AUP and the Terms and Conditions, the provisions of the Terms and Conditions shall prevail, unless explicitly stated otherwise.
Contact Information
For any questions or clarifications regarding this AUP, please contact us here.
© 2025 Swebify - All rights reserved.