3 . Usage Policy
Our Usage Policy sets out the rules for responsible and lawful use of our systems, platforms, and digital resources. It applies to all users — customers, employees, contractors, and partners alike.
3.1 Permitted Use
You may use our systems exclusively for authorised, lawful purposes in alignment with your account type and any applicable agreements. Use must support legitimate business or personal activities as intended by the service.
3.2 Prohibited Activities
The following activities are strictly prohibited:
• Gaining or attempting to gain unauthorised access to any system, account, or network
• Introducing viruses, ransomware, spyware, or any form of malicious code
• Sharing, transmitting, or downloading confidential or proprietary information without authorisation
• Using our platform for illegal activities, including piracy, fraud, or money laundering
• Circumventing security measures, rate limits, or access controls
• Using automated bots or scripts to interact with our services in an abusive manner
3.3 Account & Password Security
You are responsible for keeping your login credentials secure and confidential. Do not share passwords with others. Use strong, unique passwords and enable multi-factor authentication where available. Report any suspected compromise immediately.
3.4 System Monitoring
We reserve the right to monitor system usage to ensure compliance with this policy, detect security threats, and maintain service quality. Monitoring is conducted in accordance with applicable privacy laws and our Privacy Policy.
3.5 Consequences of Violations
Violation of this policy may result in one or more of the following actions, depending on severity:
• A formal warning and request to remedy the violation
• Temporary suspension of account access
• Permanent termination of account and services
• Referral to law enforcement or legal action where applicable
