Legal document
Thauth Acceptable Use Policy
Rules for acceptable platform usage, abuse prevention, and prohibited activity.
This Acceptable Use Policy (“AUP”) governs your use of the Thauth Service.
By using the Service, you agree to comply with this AUP. Violations may result in suspension or termination of access.
1. Purpose
This AUP is designed to ensure that the Service is used:
- Lawfully
- Securely
- Without harm to Thauth, its infrastructure, or other customers
2. Prohibited Activities
You may not use the Service to:
2.1 Illegal Activity
- Violate any applicable law or regulation
- Facilitate criminal activity
- Process data without a lawful basis
2.2 Abuse of the Service
- Send excessive or abusive API requests
- Attempt to degrade performance or availability
- Circumvent usage limits or billing mechanisms
- Exploit bugs or vulnerabilities
2.3 Security Violations
- Attempt unauthorized access to the Service or systems
- Probe, scan, or test vulnerabilities without authorization
- Interfere with authentication or authorization mechanisms
- Use stolen or unauthorized credentials
2.4 Malicious Use
- Upload or transmit malware, viruses, or harmful code
- Use the Service to support denial-of-service attacks
- Introduce malicious payloads into API requests
2.5 Misuse of Authorization Decisions
You may not:
- Use the Service to simulate or fake authorization results
- Use the Service in a way that misleads users about access control
- Rely on the Service in safety-critical systems where failure could result in harm without implementing appropriate safeguards
2.6 Data Misuse
- Submit unlawful, infringing, or harmful data
- Process personal data without proper authorization
- Use the Service to track or profile individuals unlawfully
2.7 Interference with Other Customers
- Use the Service in a way that negatively impacts other users
- Consume disproportionate system resources
3. API and Infrastructure Usage
You must:
- Use API endpoints as documented
- Implement reasonable rate limiting on your side
- Secure API Keys and credentials
You must not:
- Share API keys publicly
- Use automated tools to overload endpoints
- Attempt to reverse engineer API behavior beyond documented usage
4. Monitoring and Enforcement
Thauth reserves the right to:
- Monitor usage patterns
- Investigate suspected violations
- Suspend or restrict access
- Remove or block abusive traffic
We may take action without prior notice where necessary to:
- Protect system integrity
- Prevent harm
- Comply with legal obligations
5. Reporting Violations
If you become aware of misuse, you may report it to:
📧 legal@thauth.dev
6. Consequences of Violations
Violations may result in:
- Temporary suspension
- Permanent termination
- Legal action where applicable
7. Updates
We may update this AUP from time to time.
Continued use of the Service constitutes acceptance of the updated policy.