generated from nhcarrigan/template
feat: overhaul entire documentation (#10)
Node.js CI / Lint and Test (push) Successful in 1m10s
Node.js CI / Lint and Test (push) Successful in 1m10s
### Explanation _No response_ ### Issue _No response_ ### Attestations - [x] I have read and agree to the [Code of Conduct](https://docs.nhcarrigan.com/community/coc/) - [x] I have read and agree to the [Community Guidelines](https://docs.nhcarrigan.com/community/guide/). - [x] My contribution complies with the [Contributor Covenant](https://docs.nhcarrigan.com/dev/covenant/). ### Dependencies - [x] I have pinned the dependencies to a specific patch version. ### Style - [x] I have run the linter and resolved any errors. - [x] My pull request uses an appropriate title, matching the conventional commit standards. - [x] My scope of feat/fix/chore/etc. correctly matches the nature of changes in my pull request. ### Tests - [ ] My contribution adds new code, and I have added tests to cover it. - [ ] My contribution modifies existing code, and I have updated the tests to reflect these changes. - [ ] All new and existing tests pass locally with my changes. - [ ] Code coverage remains at or above the configured threshold. ### Documentation _No response_ ### Versioning Major - My pull request introduces a breaking change. Reviewed-on: #10 Co-authored-by: Naomi Carrigan <commits@nhcarrigan.com> Co-committed-by: Naomi Carrigan <commits@nhcarrigan.com>
This commit was merged in pull request #10.
This commit is contained in:
@@ -0,0 +1,715 @@
|
||||
---
|
||||
title: Acceptable Use Policy
|
||||
---
|
||||
|
||||
**DEFINING ACCEPTABLE AND PROHIBITED USAGE OF OUR SERVICES AND PLATFORMS**
|
||||
|
||||
## 1. INTRODUCTION AND SCOPE
|
||||
|
||||
### 1.1 Policy Purpose
|
||||
|
||||
This Acceptable Use Policy ("AUP") establishes comprehensive guidelines for the appropriate use of all services, applications, and platforms provided by nhcarrigan ("we," "us," "our," or "the Company"). This AUP supplements our Terms of Service and other applicable policies to provide detailed guidance on acceptable and prohibited usage patterns.
|
||||
|
||||
### 1.2 Scope of Application
|
||||
|
||||
This AUP applies to all users of our Services, including:
|
||||
|
||||
**(a)** All websites, web applications, and online platforms operated by nhcarrigan;
|
||||
|
||||
**(b)** Application Programming Interfaces (APIs) and related development tools;
|
||||
|
||||
**(c)** Community forums, chat platforms, and interactive services;
|
||||
|
||||
**(d)** Mobile applications and desktop software;
|
||||
|
||||
**(e)** Support services, documentation, and auxiliary platforms;
|
||||
|
||||
**(f)** Any other services, platforms, or tools provided by nhcarrigan.
|
||||
|
||||
### 1.3 Integration with Other Policies
|
||||
|
||||
This AUP operates in conjunction with our comprehensive policy framework:
|
||||
|
||||
**(a)** Our Terms of Service, which establish the fundamental legal relationship;
|
||||
|
||||
**(b)** Our Community Code of Conduct, which governs community interactions;
|
||||
|
||||
**(c)** Our Privacy Policy, which governs data collection and processing;
|
||||
|
||||
**(d)** Our Service Level Agreement and Warranty Disclaimer, which define service expectations and warranties;
|
||||
|
||||
**(e)** Our Content and Moderation Policy, which establishes detailed content standards and moderation procedures;
|
||||
|
||||
**(f)** Our Limitation of Liability and Indemnification Policy, which governs all liability and risk allocation matters;
|
||||
|
||||
**(g)** Our Export Control and Sanctions Compliance Policy, which governs international trade compliance;
|
||||
|
||||
**(h)** Our API Terms and Conditions, which govern developer and API services;
|
||||
|
||||
**(i)** Any additional service-specific terms or conditions that may apply.
|
||||
|
||||
Where conflicts arise between policies, the most restrictive terms shall apply to ensure maximum protection for all users and our organisation.
|
||||
|
||||
### 1.4 Acceptance and Compliance
|
||||
|
||||
By accessing or using any of our Services, you acknowledge that you have read, understood, and agree to comply with this AUP. Continued use of the Services constitutes ongoing acceptance of these terms and any modifications we may make.
|
||||
|
||||
## 2. GENERAL ACCEPTABLE USE PRINCIPLES
|
||||
|
||||
### 2.1 Fundamental Usage Principles
|
||||
|
||||
All use of our Services must be consistent with the following principles:
|
||||
|
||||
**(a)** **Lawful Purpose**: Services may only be used for lawful purposes in accordance with all applicable laws and regulations;
|
||||
|
||||
**(b)** **Good Faith**: Users must engage with Services and other users in good faith and with honest intent;
|
||||
|
||||
**(c)** **Respectful Interaction**: All interactions must demonstrate respect for other users, our staff, and the broader community;
|
||||
|
||||
**(d)** **Resource Responsibility**: Users must use system resources responsibly and not engage in activities that degrade performance for other users;
|
||||
|
||||
**(e)** **Security Awareness**: Users must take reasonable precautions to maintain security and report potential security issues.
|
||||
|
||||
### 2.2 Community Standards
|
||||
|
||||
Our Services are designed to foster positive, inclusive communities. All usage must:
|
||||
|
||||
**(a)** **Promote Inclusivity**: Support welcoming environments for users from diverse backgrounds;
|
||||
|
||||
**(b)** **Encourage Learning**: Facilitate educational experiences and knowledge sharing;
|
||||
|
||||
**(c)** **Support Collaboration**: Enable productive collaboration and constructive dialogue;
|
||||
|
||||
**(d)** **Maintain Quality**: Contribute to high-quality discussions and content;
|
||||
|
||||
**(e)** **Respect Boundaries**: Acknowledge and respect other users' boundaries and preferences.
|
||||
|
||||
### 2.3 Ethical Usage Requirements
|
||||
|
||||
Users are expected to:
|
||||
|
||||
**(a)** **Act with Integrity**: Conduct themselves honestly and transparently in all interactions;
|
||||
|
||||
**(b)** **Respect Privacy**: Protect the privacy and personal information of other users;
|
||||
|
||||
**(c)** **Honour Intellectual Property**: Respect copyright, trademark, and other intellectual property rights;
|
||||
|
||||
**(d)** **Avoid Harm**: Refrain from activities that could cause harm to individuals or organisations;
|
||||
|
||||
**(e)** **Take Responsibility**: Accept responsibility for the consequences of their actions and usage.
|
||||
|
||||
## 3. PROHIBITED ACTIVITIES AND CONTENT
|
||||
|
||||
### 3.1 Illegal Activities
|
||||
|
||||
Users are strictly prohibited from using our Services for:
|
||||
|
||||
**(a)** **Criminal Activity**: Any activity that violates criminal laws in any applicable jurisdiction;
|
||||
|
||||
**(b)** **Fraud and Deception**: Fraudulent schemes, identity theft, impersonation, or deceptive practices;
|
||||
|
||||
**(c)** **Money Laundering**: Any activity designed to obscure the source of illegally obtained funds;
|
||||
|
||||
**(d)** **Tax Evasion**: Activities designed to evade tax obligations or facilitate tax fraud;
|
||||
|
||||
**(e)** **Regulatory Violations**: Activities that violate financial, securities, or other regulatory requirements;
|
||||
|
||||
**(f)** **Export Control and Sanctions Violations**: Activities that violate export control laws or sanctions programmes as detailed in our Export Control and Sanctions Compliance Policy;
|
||||
|
||||
**(g)** **Drug-Related Crimes**: Sale, distribution, or promotion of illegal drugs or controlled substances;
|
||||
|
||||
**(h)** **Human Trafficking**: Any form of human trafficking or exploitation.
|
||||
|
||||
### 3.2 Abuse and Harassment
|
||||
|
||||
Our Services may not be used for:
|
||||
|
||||
**(a)** **Personal Harassment**: Targeting individuals with repeated unwanted contact or attention;
|
||||
|
||||
**(b)** **Cyberbullying**: Deliberate and repeated hostile behaviour intended to harm others;
|
||||
|
||||
**(c)** **Doxxing**: Publishing private personal information without consent;
|
||||
|
||||
**(d)** **Stalking**: Following or tracking individuals without their consent;
|
||||
|
||||
**(e)** **Threats**: Making threats of violence or other harmful actions;
|
||||
|
||||
**(f)** **Intimidation**: Using our Services to intimidate or coerce others;
|
||||
|
||||
**(g)** **Hate Speech**: Content that promotes violence or hatred based on protected characteristics;
|
||||
|
||||
**(h)** **Discrimination**: Content or behaviour that discriminates against individuals or groups.
|
||||
|
||||
### 3.3 Spam and Unsolicited Communications
|
||||
|
||||
Prohibited spam and unsolicited communication activities include:
|
||||
|
||||
**(a)** **Mass Messaging**: Sending unsolicited bulk messages or communications;
|
||||
|
||||
**(b)** **Commercial Spam**: Unsolicited advertising or promotional materials;
|
||||
|
||||
**(c)** **Phishing**: Attempts to obtain sensitive information through deceptive means;
|
||||
|
||||
**(d)** **Chain Letters**: Pyramid schemes, chain letters, or similar viral content;
|
||||
|
||||
**(e)** **Bot Networks**: Operating networks of automated accounts for spam or manipulation;
|
||||
|
||||
**(f)** **Content Flooding**: Overwhelming channels or forums with repetitive or irrelevant content;
|
||||
|
||||
**(g)** **Harvesting**: Collecting user information for unsolicited marketing or communication;
|
||||
|
||||
**(h)** **Referral Abuse**: Manipulating referral or affiliate programmes through deceptive means.
|
||||
|
||||
### 3.4 Technical Abuse and Security Violations
|
||||
|
||||
Users may not engage in:
|
||||
|
||||
**(a)** **Unauthorised Access**: Attempting to access systems, accounts, or data without proper authorisation;
|
||||
|
||||
**(b)** **System Disruption**: Activities designed to disrupt, disable, or overload our Services;
|
||||
|
||||
**(c)** **Malware Distribution**: Uploading, transmitting, or distributing malicious software;
|
||||
|
||||
**(d)** **Vulnerability Exploitation**: Exploiting security vulnerabilities for unauthorised purposes;
|
||||
|
||||
**(e)** **Denial of Service**: Launching attacks designed to make services unavailable;
|
||||
|
||||
**(f)** **Traffic Manipulation**: Artificially inflating metrics or manipulating usage statistics;
|
||||
|
||||
**(g)** **Reverse Engineering**: Unauthorised reverse engineering of our software or systems;
|
||||
|
||||
**(h)** **Circumvention**: Bypassing security measures, access controls, or usage limitations.
|
||||
|
||||
### 3.5 Intellectual Property Violations
|
||||
|
||||
Prohibited intellectual property violations include:
|
||||
|
||||
**(a)** **Copyright Infringement**: Unauthorised use, reproduction, or distribution of copyrighted material;
|
||||
|
||||
**(b)** **Trademark Misuse**: Unauthorised use of trademarks or service marks;
|
||||
|
||||
**(c)** **Patent Infringement**: Use of patented inventions without proper licensing;
|
||||
|
||||
**(d)** **Trade Secret Theft**: Misappropriation of confidential business information;
|
||||
|
||||
**(e)** **Plagiarism**: Presenting others' work as your own without proper attribution;
|
||||
|
||||
**(f)** **Licence Violations**: Using software or content in violation of licensing terms;
|
||||
|
||||
**(g)** **Counterfeit Goods**: Promotion or distribution of counterfeit products;
|
||||
|
||||
**(h)** **False Attribution**: Misrepresenting the source or ownership of intellectual property.
|
||||
|
||||
### 3.6 Harmful Content
|
||||
|
||||
**Reference to Content and Moderation Policy**: Detailed standards for prohibited content, including violent, adult, exploitative, and harmful content, are comprehensively covered in our Content and Moderation Policy, which is incorporated herein by reference.
|
||||
|
||||
Users may not upload, share, or distribute any content that violates the standards set forth in our Content and Moderation Policy.
|
||||
|
||||
## 4. SPECIFIC PLATFORM USAGE GUIDELINES
|
||||
|
||||
### 4.1 Community Platform Usage
|
||||
|
||||
When using our community forums, chat services, and interactive platforms:
|
||||
|
||||
**(a)** **Stay On Topic**: Keep discussions relevant to designated channels or forums;
|
||||
|
||||
**(b)** **Use Appropriate Channels**: Post content in appropriate sections or categories;
|
||||
|
||||
**(c)** **Respect Moderation**: Follow moderator instructions and respect community decisions;
|
||||
|
||||
**(d)** **Quality Contributions**: Contribute meaningfully to discussions rather than posting low-quality content;
|
||||
|
||||
**(e)** **Search Before Posting**: Check for existing discussions before creating new topics;
|
||||
|
||||
**(f)** **Constructive Criticism**: Provide helpful, constructive feedback rather than destructive criticism;
|
||||
|
||||
**(g)** **Citation and Attribution**: Properly cite sources and give credit when sharing others' work;
|
||||
|
||||
**(h)** **Language Standards**: Use clear, respectful language appropriate for the community context.
|
||||
|
||||
### 4.2 API and Development Tool Usage
|
||||
|
||||
When using our APIs and development tools:
|
||||
|
||||
**(a)** **Rate Limit Compliance**: Respect all rate limits and usage quotas;
|
||||
|
||||
**(b)** **Authentication**: Properly authenticate all requests and protect API credentials;
|
||||
|
||||
**(c)** **Error Handling**: Implement proper error handling and retry logic;
|
||||
|
||||
**(d)** **Caching**: Use appropriate caching to reduce unnecessary API calls;
|
||||
|
||||
**(e)** **Documentation**: Follow published API documentation and best practices;
|
||||
|
||||
**(f)** **Testing**: Use appropriate testing environments rather than production systems;
|
||||
|
||||
**(g)** **Monitoring**: Monitor usage patterns to ensure compliance with limits;
|
||||
|
||||
**(h)** **Updates**: Stay informed about API changes and update implementations accordingly.
|
||||
|
||||
### 4.3 Content Submission and Sharing
|
||||
|
||||
When submitting or sharing content through our Services:
|
||||
|
||||
**(a)** **Original Work**: Ensure you have the right to share any content you submit;
|
||||
|
||||
**(b)** **Accurate Information**: Provide accurate and truthful information;
|
||||
|
||||
**(c)** **Appropriate Categorisation**: Categorise and tag content appropriately;
|
||||
|
||||
**(d)** **Content Warnings**: Provide appropriate warnings for potentially sensitive content;
|
||||
|
||||
**(e)** **Copyright Compliance**: Ensure all shared content complies with copyright law;
|
||||
|
||||
**(f)** **Privacy Respect**: Do not share others' private information without consent;
|
||||
|
||||
**(g)** **Quality Standards**: Maintain reasonable quality standards for shared content;
|
||||
|
||||
**(h)** **Community Guidelines**: Follow any specific guidelines for content types or categories.
|
||||
|
||||
## 5. COMMERCIAL AND BUSINESS USE
|
||||
|
||||
### 5.1 Permitted Commercial Activities
|
||||
|
||||
The following commercial activities are generally permitted when conducted in accordance with applicable terms:
|
||||
|
||||
**(a)** **Educational Services**: Providing educational content, training, or consulting services;
|
||||
|
||||
**(b)** **Open Source Development**: Contributing to or maintaining open source projects;
|
||||
|
||||
**(c)** **Community Building**: Building communities around products or services;
|
||||
|
||||
**(d)** **Content Creation**: Creating educational or informational content related to our services;
|
||||
|
||||
**(e)** **Legitimate Promotion**: Reasonable promotion of products or services relevant to community interests;
|
||||
|
||||
**(f)** **Professional Services**: Offering professional services related to our platforms or community;
|
||||
|
||||
**(g)** **Event Organisation**: Organising educational or community events;
|
||||
|
||||
**(h)** **Research Activities**: Conducting legitimate research or academic studies.
|
||||
|
||||
### 5.2 Prohibited Commercial Activities
|
||||
|
||||
The following commercial activities are prohibited:
|
||||
|
||||
**(a)** **Unauthorised Reselling**: Reselling or redistributing our services without authorisation;
|
||||
|
||||
**(b)** **Competitive Services**: Using our services to develop competing products or services;
|
||||
|
||||
**(c)** **Data Harvesting**: Collecting user data for commercial exploitation;
|
||||
|
||||
**(d)** **Spam Marketing**: Using our services for unsolicited marketing or advertising;
|
||||
|
||||
**(e)** **Fraudulent Schemes**: Operating fraudulent business schemes or scams;
|
||||
|
||||
**(f)** **Pyramid Schemes**: Promoting pyramid schemes or multi-level marketing scams;
|
||||
|
||||
**(g)** **Unauthorised Monetisation**: Monetising our services without proper authorisation;
|
||||
|
||||
**(h)** **Brand Confusion**: Using our brand or trademarks in ways that create confusion.
|
||||
|
||||
### 5.3 Commercial Use Authorisation
|
||||
|
||||
For commercial activities that may require special authorisation:
|
||||
|
||||
**(a)** **Written Permission**: Obtain written permission for activities not clearly covered by standard terms;
|
||||
|
||||
**(b)** **Licensing Agreements**: Enter into appropriate licensing agreements when required;
|
||||
|
||||
**(c)** **Revenue Sharing**: Comply with any revenue sharing requirements;
|
||||
|
||||
**(d)** **Brand Guidelines**: Follow brand usage guidelines for any use of our trademarks or logos;
|
||||
|
||||
**(e)** **Commercial Terms**: Agree to any additional commercial terms that may apply;
|
||||
|
||||
**(f)** **Regular Review**: Submit to regular review of commercial usage patterns;
|
||||
|
||||
**(g)** **Reporting Requirements**: Comply with any reporting requirements for commercial usage;
|
||||
|
||||
**(h)** **Termination Rights**: Acknowledge our right to terminate commercial arrangements.
|
||||
|
||||
## 6. RESOURCE USAGE AND PERFORMANCE
|
||||
|
||||
### 6.1 Fair Use of System Resources
|
||||
|
||||
Users must:
|
||||
|
||||
**(a)** **Reasonable Usage**: Use system resources reasonably and not excessively;
|
||||
|
||||
**(b)** **Efficient Operations**: Design applications and usage patterns for efficiency;
|
||||
|
||||
**(c)** **Resource Monitoring**: Monitor resource usage to avoid exceeding reasonable limits;
|
||||
|
||||
**(d)** **Optimisation**: Optimise code and queries for performance and resource efficiency;
|
||||
|
||||
**(e)** **Caching**: Implement appropriate caching to reduce server load;
|
||||
|
||||
**(f)** **Batch Operations**: Use batch operations rather than individual requests where appropriate;
|
||||
|
||||
**(g)** **Off-Peak Usage**: Schedule resource-intensive operations during off-peak hours when possible;
|
||||
|
||||
**(h)** **Graceful Degradation**: Implement graceful degradation when resources are limited.
|
||||
|
||||
### 6.2 Prohibited Resource Usage
|
||||
|
||||
The following resource usage patterns are prohibited:
|
||||
|
||||
**(a)** **Excessive Consumption**: Using disproportionate amounts of bandwidth, storage, or processing power;
|
||||
|
||||
**(b)** **Resource Hoarding**: Claiming or reserving resources not actively being used;
|
||||
|
||||
**(c)** **Intentional Overload**: Deliberately overloading systems or services;
|
||||
|
||||
**(d)** **Mining Activities**: Using our systems for cryptocurrency mining or similar activities;
|
||||
|
||||
**(e)** **Proxy Services**: Using our services as proxies or VPNs without authorisation;
|
||||
|
||||
**(f)** **Load Testing**: Conducting load testing or stress testing without prior approval;
|
||||
|
||||
**(g)** **Automated Scraping**: Automated scraping or crawling beyond reasonable limits;
|
||||
|
||||
**(h)** **Storage Abuse**: Using storage services for inappropriate content or excessive backup purposes.
|
||||
|
||||
### 6.3 Performance Impact Mitigation
|
||||
|
||||
To minimise performance impact on other users:
|
||||
|
||||
**(a)** **Rate Limiting**: Implement client-side rate limiting to avoid overwhelming services;
|
||||
|
||||
**(b)** **Error Handling**: Implement proper error handling to avoid retry storms;
|
||||
|
||||
**(c)** **Connection Management**: Properly manage connections and avoid connection leaks;
|
||||
|
||||
**(d)** **Data Compression**: Use appropriate data compression for network transfers;
|
||||
|
||||
**(e)** **Lazy Loading**: Implement lazy loading for non-critical resources;
|
||||
|
||||
**(f)** **Progress Monitoring**: Monitor long-running operations for completion and errors;
|
||||
|
||||
**(g)** **Timeout Handling**: Implement appropriate timeouts for all operations;
|
||||
|
||||
**(h)** **Resource Cleanup**: Properly clean up resources after use.
|
||||
|
||||
## 7. DATA HANDLING AND PRIVACY
|
||||
|
||||
### 7.1 Personal Data Protection
|
||||
|
||||
Users must:
|
||||
|
||||
**(a)** **Consent Requirements**: Obtain proper consent before collecting or processing personal data;
|
||||
|
||||
**(b)** **Data Minimisation**: Collect only the minimum data necessary for stated purposes;
|
||||
|
||||
**(c)** **Purpose Limitation**: Use personal data only for the purposes for which it was collected;
|
||||
|
||||
**(d)** **Security Measures**: Implement appropriate security measures to protect personal data;
|
||||
|
||||
**(e)** **Retention Limits**: Retain personal data only for as long as necessary;
|
||||
|
||||
**(f)** **Access Rights**: Respect individuals' rights to access, correct, and delete their data;
|
||||
|
||||
**(g)** **Breach Notification**: Promptly report any suspected data breaches or security incidents;
|
||||
|
||||
**(h)** **Legal Compliance**: Comply with all applicable data protection laws and regulations.
|
||||
|
||||
### 7.2 Prohibited Data Practices
|
||||
|
||||
Users may not:
|
||||
|
||||
**(a)** **Unauthorised Collection**: Collect personal data without proper legal basis;
|
||||
|
||||
**(b)** **Data Scraping**: Scrape or harvest user data from our services;
|
||||
|
||||
**(c)** **Profile Building**: Build user profiles without explicit consent;
|
||||
|
||||
**(d)** **Data Sale**: Sell or monetise personal data obtained through our services;
|
||||
|
||||
**(e)** **Cross-Platform Tracking**: Track users across multiple platforms without consent;
|
||||
|
||||
**(f)** **Sensitive Data**: Process sensitive personal data without explicit consent and proper safeguards;
|
||||
|
||||
**(g)** **Data Sharing**: Share personal data with third parties without proper consent;
|
||||
|
||||
**(h)** **Retention Abuse**: Retain personal data longer than necessary or permitted.
|
||||
|
||||
### 7.3 Data Security Requirements
|
||||
|
||||
When handling data through our services:
|
||||
|
||||
**(a)** **Encryption**: Use appropriate encryption for data in transit and at rest;
|
||||
|
||||
**(b)** **Access Controls**: Implement proper access controls and authentication;
|
||||
|
||||
**(c)** **Audit Logging**: Maintain audit logs of data access and processing activities;
|
||||
|
||||
**(d)** **Backup Security**: Ensure backups are properly secured and encrypted;
|
||||
|
||||
**(e)** **Incident Response**: Have appropriate incident response procedures in place;
|
||||
|
||||
**(f)** **Regular Updates**: Keep systems updated with security patches;
|
||||
|
||||
**(g)** **Vulnerability Management**: Regularly assess and address security vulnerabilities;
|
||||
|
||||
**(h)** **Staff Training**: Ensure staff are trained on data security best practices.
|
||||
|
||||
## 8. ENFORCEMENT AND COMPLIANCE
|
||||
|
||||
### 8.1 Monitoring and Detection
|
||||
|
||||
We employ various methods to monitor compliance with this AUP:
|
||||
|
||||
**(a)** **Automated Monitoring**: Automated systems to detect prohibited activities;
|
||||
|
||||
**(b)** **User Reporting**: Community reporting mechanisms for policy violations;
|
||||
|
||||
**(c)** **Manual Review**: Human review of reported content and activities;
|
||||
|
||||
**(d)** **Pattern Analysis**: Analysis of usage patterns to identify potential violations;
|
||||
|
||||
**(e)** **Security Scanning**: Regular security scans to identify malicious activities;
|
||||
|
||||
**(f)** **Performance Monitoring**: Monitoring for unusual resource usage patterns;
|
||||
|
||||
**(g)** **Content Analysis**: Analysis of submitted content for policy compliance;
|
||||
|
||||
**(h)** **Behavioural Analysis**: Monitoring for suspicious or harmful behavioural patterns.
|
||||
|
||||
### 8.2 Violation Response Procedures
|
||||
|
||||
When violations are identified, we may take the following actions:
|
||||
|
||||
**(a)** **Warning**: Issue formal warnings about policy violations;
|
||||
|
||||
**(b)** **Content Removal**: Remove violating content from our services;
|
||||
|
||||
**(c)** **Account Suspension**: Temporarily suspend user accounts;
|
||||
|
||||
**(d)** **Feature Restrictions**: Restrict access to specific features or services;
|
||||
|
||||
**(e)** **Rate Limiting**: Implement additional rate limits for abusive usage;
|
||||
|
||||
**(f)** **Account Termination**: Permanently terminate user accounts for serious violations;
|
||||
|
||||
**(g)** **Legal Action**: Pursue legal remedies for serious violations or continued non-compliance;
|
||||
|
||||
**(h)** **Law Enforcement**: Report criminal activities to appropriate law enforcement agencies.
|
||||
|
||||
### 8.3 Progressive Enforcement
|
||||
|
||||
Our enforcement approach generally follows a progressive model:
|
||||
|
||||
**(a)** **First Violation**: Education and warning about policy requirements;
|
||||
|
||||
**(b)** **Second Violation**: Formal warning with specific corrective actions required;
|
||||
|
||||
**(c)** **Third Violation**: Temporary suspension with mandatory policy review;
|
||||
|
||||
**(d)** **Continued Violations**: Permanent account termination and service exclusion;
|
||||
|
||||
**(e)** **Serious Violations**: Immediate severe penalties for violations that pose significant risk;
|
||||
|
||||
**(f)** **Criminal Activity**: Immediate termination and law enforcement referral;
|
||||
|
||||
**(g)** **Security Threats**: Immediate protective measures and account restrictions;
|
||||
|
||||
**(h)** **Repeated Offenders**: Enhanced penalties for users with previous violation history.
|
||||
|
||||
### 8.4 Appeals and Review
|
||||
|
||||
Users may appeal enforcement actions through:
|
||||
|
||||
**(a)** **Appeals Process**: Formal appeals process as outlined in our Community Appeals Policy;
|
||||
|
||||
**(b)** **Evidence Submission**: Opportunity to provide evidence and explanations;
|
||||
|
||||
**(c)** **Independent Review**: Review by staff members not involved in the original decision;
|
||||
|
||||
**(d)** **Corrective Actions**: Opportunity to take corrective actions to address violations;
|
||||
|
||||
**(e)** **Account Restoration**: Possible account restoration for successfully appealed actions;
|
||||
|
||||
**(f)** **Policy Clarification**: Clarification of policy requirements and expectations;
|
||||
|
||||
**(g)** **Education Opportunities**: Additional education about policy compliance;
|
||||
|
||||
**(h)** **Ongoing Monitoring**: Enhanced monitoring for users with violation history.
|
||||
|
||||
## 9. REPORTING VIOLATIONS
|
||||
|
||||
### 9.1 Community Reporting
|
||||
|
||||
We encourage users to report policy violations through:
|
||||
|
||||
**(a)** **Report Features**: Built-in reporting features within our applications and platforms;
|
||||
|
||||
**(b)** **Email Reporting**: Direct email reports to abuse@nhcarrigan.com;
|
||||
|
||||
**(c)** **Community Moderators**: Reports to designated community moderators;
|
||||
|
||||
**(d)** **Support Channels**: Reports through general support channels with appropriate categorisation;
|
||||
|
||||
**(e)** **Anonymous Reporting**: Anonymous reporting options where technically feasible;
|
||||
|
||||
**(f)** **Urgent Reports**: Expedited reporting for urgent safety or security issues;
|
||||
|
||||
**(g)** **Documentation**: Detailed documentation of violations with supporting evidence;
|
||||
|
||||
**(h)** **Follow-up**: Follow-up communication about report status and outcomes.
|
||||
|
||||
### 9.2 What to Include in Reports
|
||||
|
||||
Effective violation reports should include:
|
||||
|
||||
**(a)** **Specific Details**: Clear description of the violating behaviour or content;
|
||||
|
||||
**(b)** **Policy Reference**: Reference to specific policy provisions that were violated;
|
||||
|
||||
**(c)** **Evidence**: Screenshots, logs, or other evidence supporting the report;
|
||||
|
||||
**(d)** **Context**: Relevant context that helps understand the violation;
|
||||
|
||||
**(e)** **Impact**: Description of harm or potential harm caused by the violation;
|
||||
|
||||
**(f)** **User Information**: Information about the violating user or account;
|
||||
|
||||
**(g)** **Time and Date**: When the violation occurred;
|
||||
|
||||
**(h)** **Contact Information**: Your contact information for follow-up questions.
|
||||
|
||||
### 9.3 Reporter Protection
|
||||
|
||||
We are committed to protecting users who report violations:
|
||||
|
||||
**(a)** **Confidentiality**: Reporter information is kept confidential to the extent possible;
|
||||
|
||||
**(b)** **No Retaliation**: We prohibit retaliation against users who make good-faith reports;
|
||||
|
||||
**(c)** **Anonymous Options**: Anonymous reporting options where technically feasible;
|
||||
|
||||
**(d)** **Privacy Protection**: Reporter identity is not disclosed to alleged violators;
|
||||
|
||||
**(e)** **Support Services**: Support for users who experience harassment for reporting violations;
|
||||
|
||||
**(f)** **Legal Protection**: Legal support for reporters facing retaliation;
|
||||
|
||||
**(g)** **Community Support**: Community support for users who report serious violations;
|
||||
|
||||
**(h)** **Safe Environment**: Commitment to maintaining safe environments for reporting violations.
|
||||
|
||||
## 10. POLICY UPDATES AND MODIFICATIONS
|
||||
|
||||
### 10.1 Right to Modify
|
||||
|
||||
We reserve the right to modify this AUP at any time to:
|
||||
|
||||
**(a)** **Address New Risks**: Respond to emerging security threats or abuse patterns;
|
||||
|
||||
**(b)** **Legal Compliance**: Ensure compliance with changing laws and regulations;
|
||||
|
||||
**(c)** **Service Evolution**: Reflect changes in our services and technology;
|
||||
|
||||
**(d)** **Community Feedback**: Incorporate feedback from users and community members;
|
||||
|
||||
**(e)** **Best Practices**: Align with evolving industry best practices;
|
||||
|
||||
**(f)** **Clarification**: Clarify ambiguous provisions based on enforcement experience;
|
||||
|
||||
**(g)** **Coverage Expansion**: Expand coverage to address previously unaddressed issues;
|
||||
|
||||
**(h)** **Effectiveness**: Improve the effectiveness of policy enforcement.
|
||||
|
||||
### 10.2 Notification of Changes
|
||||
|
||||
Material changes to this AUP will be communicated through:
|
||||
|
||||
**(a)** **Website Notice**: Prominent notice on our primary website;
|
||||
|
||||
**(b)** **Email Notification**: Direct notification to registered users where contact information is available;
|
||||
|
||||
**(c)** **In-Service Notifications**: Notifications within our applications and platforms;
|
||||
|
||||
**(d)** **Community Announcements**: Announcements in community forums and channels;
|
||||
|
||||
**(e)** **Policy Updates Page**: Dedicated page documenting policy changes and their rationale;
|
||||
|
||||
**(f)** **Version History**: Maintained version history of policy changes;
|
||||
|
||||
**(g)** **Effective Date Notice**: Clear indication of when changes become effective;
|
||||
|
||||
**(h)** **Transition Periods**: Reasonable transition periods for compliance with new requirements.
|
||||
|
||||
### 10.3 User Response to Changes
|
||||
|
||||
Following notification of policy changes:
|
||||
|
||||
**(a)** **Review Period**: Users have reasonable time to review changes before they take effect;
|
||||
|
||||
**(b)** **Continued Use**: Continued use of services constitutes acceptance of modified terms;
|
||||
|
||||
**(c)** **Opt-Out Rights**: Users may discontinue service use if they disagree with changes;
|
||||
|
||||
**(d)** **Feedback Opportunities**: Opportunities to provide feedback about proposed changes;
|
||||
|
||||
**(e)** **Clarification Requests**: Users may request clarification about policy changes;
|
||||
|
||||
**(f)** **Compliance Timeline**: Reasonable timeline for bringing existing usage into compliance;
|
||||
|
||||
**(g)** **Support Resources**: Additional support resources to help understand and comply with changes;
|
||||
|
||||
**(h)** **Grandfathering**: Consideration of grandfathering provisions for existing legitimate usage.
|
||||
|
||||
## 11. CONTACT INFORMATION AND SUPPORT
|
||||
|
||||
### 11.1 Policy Questions and Clarifications
|
||||
|
||||
For questions about this AUP:
|
||||
|
||||
**Email:** aup@nhcarrigan.com
|
||||
|
||||
**Subject Line:** AUP Inquiry - [Brief Description]
|
||||
|
||||
**Response Time:** Within 3 business days for policy clarification requests
|
||||
|
||||
### 11.2 Violation Reporting
|
||||
|
||||
To report policy violations:
|
||||
|
||||
**Email:** abuse@nhcarrigan.com
|
||||
|
||||
**Subject Line:** Policy Violation Report - [Service/Platform]
|
||||
|
||||
**Response Time:** Within 24 hours for urgent safety issues, 48 hours for standard reports
|
||||
|
||||
### 11.3 Appeals and Disputes
|
||||
|
||||
For appeals related to AUP enforcement:
|
||||
|
||||
**Email:** appeals@nhcarrigan.com
|
||||
|
||||
**Subject Line:** AUP Appeal - [Account/Case Reference]
|
||||
|
||||
**Process:** Follow our Community Appeals Policy procedures
|
||||
|
||||
### 11.4 Technical Support
|
||||
|
||||
For technical issues related to policy compliance:
|
||||
|
||||
**Email:** support@nhcarrigan.com
|
||||
|
||||
**Community Forum:** https://forum.nhcarrigan.com
|
||||
|
||||
**Response Time:** Within 48 hours for technical support requests
|
||||
|
||||
**Document Version:** 1.0
|
||||
|
||||
**Last Updated:** 15 September 2025
|
||||
|
||||
**Effective Date:** 15 September 2025
|
||||
|
||||
**Next Review Date:** 15 September 2026
|
||||
|
||||
---
|
||||
|
||||
*This Acceptable Use Policy establishes comprehensive guidelines for appropriate use of our services. By using our Services, you agree to comply with these usage standards and acknowledge that violations may result in service restrictions or termination. For questions about acceptable use or to report violations, please contact us at aup@nhcarrigan.com.*
|
||||
Reference in New Issue
Block a user