Acceptable Use Policy
This Acceptable Use Policy (“AUP”) governs access to and use of the website, systems, software, APIs, data feeds, landing pages, integrations, and services provided by FusionByte Media LLC (“FusionByte,” “we,” “us,” or “our”) (collectively, the “Services”).
By accessing or using the Services, you agree to comply with this AUP, our Terms and Conditions, Privacy Policy, TCPA & Consent Compliance Policy, and Data Usage & Buyer Responsibility Policy.
1. Purpose
The purpose of this AUP is to:
Protect the security, integrity, and reliability of FusionByte systems
Prevent fraud, abuse, unauthorized access, and misuse
Ensure legal and regulatory compliance
Protect consumers, partners, and data integrity
2. Permitted Use
You may use the Services only for lawful business purposes consistent with your contractual relationship with FusionByte and all applicable laws and regulations.
3. Prohibited Activities
You agree not to engage in any activity that:
a) Security Violations
Attempting to gain unauthorized access to systems, servers, APIs, databases, or accounts
Circumventing authentication, rate limits, or access controls
Introducing malware, ransomware, spyware, or malicious scripts
Performing vulnerability scanning or penetration testing without written authorization
b) Data Abuse and Misuse
Scraping, harvesting, or copying data without authorization
Reverse engineering systems, APIs, or workflows
Replicating or redistributing FusionByte data
Bypassing validation controls
Uploading false, fabricated, incentivized, or bot-generated data
c) Infrastructure Abuse
Excessive API requests or automated traffic that degrades performance
Attempting denial-of-service attacks
Using the Services to relay spam, phishing, or abusive content
Abusing form submissions or automation pipelines
d) Legal and Regulatory Violations
Violating TCPA, CAN-SPAM, FCC rules, privacy laws, or consumer protection laws
Contacting consumers without proper consent
Ignoring opt-out requests
Using deceptive scripts or misrepresentation
e) Fraudulent or Deceptive Conduct
Identity falsification
Misrepresentation of business intent
Manipulating lead quality, timestamps, or consent records
Using stolen, purchased, or recycled data
f) Intellectual Property Violations
Copying, reproducing, or redistributing proprietary materials
Using FusionByte branding without permission
Infringing copyrights or trademarks
4. Monitoring and Enforcement
FusionByte reserves the right to:
Monitor usage for compliance and security
Investigate suspected violations
Suspend, throttle, or terminate access immediately
Disable integrations or credentials
Preserve logs and cooperate with lawful investigations
FusionByte is not obligated to provide advance notice where immediate risk exists.
5. Reporting Violations
Suspected violations may be reported to:
6. Buyer and Partner Responsibility
Each user is responsible for ensuring that their employees, contractors, agents, and systems comply with this AUP.
Violations by associated parties are treated as violations by the Buyer or Partner.
7. No Circumvention
You may not attempt to bypass technical controls, restrictions, or enforcement actions imposed by FusionByte.
8. Indemnification
You agree to indemnify and hold harmless FusionByte from any claims, damages, penalties, investigations, or liabilities arising from your violation of this AUP.
9. Suspension and Termination
FusionByte may suspend or terminate access immediately for violations or suspected violations of this AUP.
Suspension does not waive any legal or contractual remedies.
10. Changes to Policy
FusionByte may modify this AUP at any time. Updates will be posted on the Website and become effective upon posting.
11. Contact Information
For questions regarding this Policy, contact:
FusionByte Media LLC
📧 info@fusionbyte.io
🌐 www.fusionbyte.io