Acceptable Use Policy
The websites of NodesPay Tekh Pte Ltd. ("NodesPay" or "we"), including without limitation those located at https://nodespay.com/ and https://construction.nodespay.com, and any service offerings provided on those websites, including without limitation the NodesPay platform (the websites and such service offerings are collectively referred to as the "Services"), are subject to the terms and conditions outlined in this Acceptable Use Policy (this "Policy"). Contact su[email protected] with any questions about this policy.
No Illegal, Harmful, or Offensive Use or Content
You may not use the Services for any illegal, harmful, fraudulent, infringing, or offensive purpose, or to transmit, store, display, distribute, or otherwise make available content that is unlawful, harmful, fraudulent, infringing, or offensive. You may not also encourage, promote, make it easier for, or give instructions to others about how to use the Services. Activities or content that are prohibited include:
Illegal, harmful, fraudulent, or high-risk activities. Rights of others that may harm the Service, others, our operations or our reputation, including distributing, promoting or encouraging child pornography, offering or disseminating unauthorized goods, services, programs or promotions; unlawful activity that violates Money, pyramid schemes, pyramid schemes, phishing or pharming, or any activity where failure of the Service could result in death or serious personal injury, or severe property or environmental damage.
Infringing Content. Content that infringes or exploits the intellectual property or proprietary rights of others.
Offensive content. Content that is defamatory, obscene, offensive, invasive of privacy, or otherwise objectionable, including content depicting child pornography, referring to sodomy, or depicting non-consensual sexual activity.
Malicious content. Content or other computer technology that may damage, disrupt, surreptitiously intercept, or expropriate any system, program, or data, including malware, viruses, Trojan horses, worms, time bombs, or cancelbots.
No Security Violations
You may not use the Services to compromise the security or integrity of any network, computer or communications system, software application, or network or computing device (each a "System"). Prohibited activities include:
Unauthorized access. Unauthorized access to or use of the System, including probing, scanning or testing the vulnerability of the System, or breaching any security or authentication measures used by the System.
Intercept. Monitor data or traffic on your system without permission.
Fraudulent origin. Forge TCP-IP packet headers, email headers, or any part of a message that describes its origin or route. This provision does not prohibit the lawful use of pseudonymous and anonymous remailers.
No Network Abuse
Do not create network connections unless you have permission to communicate with users, hosts, or networks. Prohibited activities include:
monitoring or crawling. Monitor or crawl systems that impair or disrupt monitored or crawled systems.
Denial of Service (DoS). Flooding the target with communication requests, either preventing the target from responding to legitimate traffic or responding too slowly to be effective. Deliberate Obstruction. interfere with the proper functioning of the system; This includes attempts to intentionally overload systems with mail bombing, news bombing, broadcast attacks, or flooding techniques.
Operation of certain network services. Operational network services such as open proxies, open mail relays, and open recursive domain name servers. Bypass system limits. Use manual or electronic means to circumvent usage restrictions imposed on the system. B. Access and Storage Restrictions.
No E-Mail or Other Message Abuse
Do not distribute, post, send, or facilitate the transmission of unsolicited bulk e-mail or other messages, promotions, advertisements, or solicitations (such as "spam"). This includes commercial solicitations and informational announcements. You may not modify or edit email headers or impersonate the sender without the sender's explicit consent. If a message sent by another Internet service provider violates this policy or that provider's acceptable use policy, we will not collect replies to that message.
No Assistance or Encouragement
You will not assist or encourage anyone to do any of the above.
Our Monitoring and Enforcement
We reserve the right, but have no obligation, to investigate violations of this Policy or misuse of the Service. we can:
Investigate violations of this Policy or misuse of the Service; or Remove, disable access to, or modify any content or resources that violates this Policy or any other agreement we have with you regarding your use of the Services. We may report any activity that we believe violates any law or regulation to appropriate law enforcement officials, regulators or other appropriate third parties. Our reports may include disclosure of appropriate customer information.
Reporting of Violations of this Policy
If you become aware of any violation of this policy, you agree to notify us immediately and provide any assistance necessary to stop or remedy the violation. To report a violation of this policy, please contact us at [email protected]. We may amend this Policy from time to time to more accurately describe or explain any applicable restrictions on your use of the Services by posting a revised version of this Policy. The revised Policy will be effective from the date of such posting.
Last updated: 15 March 2023