Email Service - Acceptable Use Policy
1. Guiding Principle
Our email services are provided for person-to-person communication. The platform is intended for the exchange of personal and professional correspondence between individuals and small groups in a lawful and ethical manner. The core purpose is to facilitate genuine communication, not mass distribution.
2. Permitted Use
You are encouraged to use our email services for:
- Sending and receiving personal emails with friends, family, and colleagues.
- Corresponding with businesses and organizations for legitimate purposes.
- Communicating with small groups of known contacts (e.g., a project team, a family group) where all recipients have a pre-existing relationship with you.
3. Prohibited Use
To protect the integrity of our services and ensure a safe environment for all users, the following activities are strictly prohibited. Violation of these terms may result in immediate suspension or termination of your account.
- Spam and Unsolicited Email: You may not send, or facilitate the sending of, Unsolicited Bulk Email (UBE) or Unsolicited Commercial Email (UCE), commonly known as spam. This includes, but is not limited to:
- Email sent to addresses obtained from purchased or rented lists.
- Email sent to addresses that were harvested or scraped from the web.
- Messages sent to recipients who have not explicitly consented (opted-in) to receive mail from you.
- Automated and High-Volume Mailing: The use of scripts, applications, or any automated system to send bulk email is forbidden. This service is not a platform for marketing campaigns, newsletters, or other mass mailings.
- Malicious and Illegal Content: You may not use our services to transmit or store content that is:
- Unlawful, fraudulent, or facilitates phishing, scams, or pyramid schemes.
- Harassing, defamatory, abusive, or threatening.
- Infringing on the intellectual property rights of others (e.g., copyright, trademark).
- Designed to spread malware, viruses, trojans, or other destructive code.
- System Abuse: You may not engage in any activity that disrupts or compromises the security and stability of our email infrastructure. This includes:
- Mail bombing (sending a large number of emails to a single address to overwhelm it).
- Spoofing headers or otherwise misrepresenting the origin of an email.
- Impersonating another person or entity.
4. Security, Filtering, and Disclaimer
To protect our infrastructure and users, we employ automated systems to scan all incoming and outgoing email traffic. These systems use signature-based detection, heuristic analysis, and other algorithms to identify and filter spam, viruses, and other malicious content.
While we strive for high accuracy, these automated services are not perfect. It is possible that:
- legitimate email may be inadvertently blocked or flagged as spam (a "false positive").
- A malicious email may not be detected and could be delivered to your inbox (a "false negative").
We are not liable for any damages or loss of opportunity arising from misidentified, blocked, or undelivered email. It is your responsibility to monitor your spam/junk folder for legitimate messages and to remain vigilant against malicious emails.