Usage Policy

3 . Usage Policy

Our Usage Policy sets out the rules for responsible and lawful use of our systems, platforms, and digital resources. It applies to all users — customers, employees, contractors, and partners alike.

3.1 Permitted Use

You may use our systems exclusively for authorised, lawful purposes in alignment with your account type and any applicable agreements. Use must support legitimate business or personal activities as intended by the service.

3.2 Prohibited Activities

The following activities are strictly prohibited:
     •    Gaining or attempting to gain unauthorised access to any system, account, or network
     •    Introducing viruses, ransomware, spyware, or any form of malicious code
     •    Sharing, transmitting, or downloading confidential or proprietary information without authorisation
     •    Using our platform for illegal activities, including piracy, fraud, or money laundering
     •    Circumventing security measures, rate limits, or access controls
     •    Using automated bots or scripts to interact with our services in an abusive manner

3.3 Account & Password Security

You are responsible for keeping your login credentials secure and confidential. Do not share passwords with others. Use strong, unique passwords and enable multi-factor authentication where available. Report any suspected compromise immediately.

3.4 System Monitoring

We reserve the right to monitor system usage to ensure compliance with this policy, detect security threats, and maintain service quality. Monitoring is conducted in accordance with applicable privacy laws and our Privacy Policy.

3.5 Consequences of Violations

Violation of this policy may result in one or more of the following actions, depending on severity:
     •    A formal warning and request to remedy the violation
     •    Temporary suspension of account access
     •    Permanent termination of account and services
     •    Referral to law enforcement or legal action where applicable