feat: time for another audit/overhaul/revamp (#13)
Node.js CI / Lint and Test (push) Successful in 1m56s

### Explanation

_No response_

### Issue

Closes #11

### Attestations

- [ ] I have read and agree to the [Code of Conduct](https://docs.nhcarrigan.com/community/coc/)
- [ ] I have read and agree to the [Community Guidelines](https://docs.nhcarrigan.com/community/guide/).
- [ ] My contribution complies with the [Contributor Covenant](https://docs.nhcarrigan.com/dev/covenant/).

### Dependencies

- [ ] I have pinned the dependencies to a specific patch version.

### Style

- [ ] I have run the linter and resolved any errors.
- [ ] My pull request uses an appropriate title, matching the conventional commit standards.
- [ ] My scope of feat/fix/chore/etc. correctly matches the nature of changes in my pull request.

### Tests

- [ ] My contribution adds new code, and I have added tests to cover it.
- [ ] My contribution modifies existing code, and I have updated the tests to reflect these changes.
- [ ] All new and existing tests pass locally with my changes.
- [ ] Code coverage remains at or above the configured threshold.

### Documentation

_No response_

### Versioning

_No response_

Reviewed-on: #13
Co-authored-by: Naomi Carrigan <commits@nhcarrigan.com>
Co-committed-by: Naomi Carrigan <commits@nhcarrigan.com>
This commit was merged in pull request #13.
This commit is contained in:
2025-11-13 21:59:23 -08:00
committed by Naomi Carrigan
parent 78ea7cc209
commit f8f787bde9
113 changed files with 6384 additions and 4254 deletions
+44 -52
View File
@@ -6,15 +6,15 @@ title: Acceptable Use Policy
## 1. INTRODUCTION AND SCOPE
### 1.1 Policy Purpose
### 1.1. Policy Purpose
This Acceptable Use Policy ("AUP") establishes comprehensive guidelines for the appropriate use of all services, applications, and platforms provided by nhcarrigan ("we," "us," "our," or "the Company"). This AUP supplements our Terms of Service and other applicable policies to provide detailed guidance on acceptable and prohibited usage patterns.
This Acceptable Use Policy ("AUP") establishes comprehensive guidelines for the appropriate use of all services, applications, and platforms provided by NHCarrigan ("we," "us," "our," or "the Company"). This AUP supplements our Terms of Service and other applicable policies to provide detailed guidance on acceptable and prohibited usage patterns.
### 1.2 Scope of Application
### 1.2. Scope of Application
This AUP applies to all users of our Services, including:
**(a)** All websites, web applications, and online platforms operated by nhcarrigan;
**(a)** All websites, web applications, and online platforms operated by NHCarrigan;
**(b)** Application Programming Interfaces (APIs) and related development tools;
@@ -24,9 +24,9 @@ This AUP applies to all users of our Services, including:
**(e)** Support services, documentation, and auxiliary platforms;
**(f)** Any other services, platforms, or tools provided by nhcarrigan.
**(f)** Any other services, platforms, or tools provided by NHCarrigan.
### 1.3 Integration with Other Policies
### 1.3. Integration with Other Policies
This AUP operates in conjunction with our comprehensive policy framework:
@@ -50,13 +50,13 @@ This AUP operates in conjunction with our comprehensive policy framework:
Where conflicts arise between policies, the most restrictive terms shall apply to ensure maximum protection for all users and our organisation.
### 1.4 Acceptance and Compliance
### 1.4. Acceptance and Compliance
By accessing or using any of our Services, you acknowledge that you have read, understood, and agree to comply with this AUP. Continued use of the Services constitutes ongoing acceptance of these terms and any modifications we may make.
## 2. GENERAL ACCEPTABLE USE PRINCIPLES
### 2.1 Fundamental Usage Principles
### 2.1. Fundamental Usage Principles
All use of our Services must be consistent with the following principles:
@@ -70,7 +70,7 @@ All use of our Services must be consistent with the following principles:
**(e)** **Security Awareness**: Users must take reasonable precautions to maintain security and report potential security issues.
### 2.2 Community Standards
### 2.2. Community Standards
Our Services are designed to foster positive, inclusive communities. All usage must:
@@ -84,7 +84,7 @@ Our Services are designed to foster positive, inclusive communities. All usage m
**(e)** **Respect Boundaries**: Acknowledge and respect other users' boundaries and preferences.
### 2.3 Ethical Usage Requirements
### 2.3. Ethical Usage Requirements
Users are expected to:
@@ -100,7 +100,7 @@ Users are expected to:
## 3. PROHIBITED ACTIVITIES AND CONTENT
### 3.1 Illegal Activities
### 3.1. Illegal Activities
Users are strictly prohibited from using our Services for:
@@ -120,7 +120,7 @@ Users are strictly prohibited from using our Services for:
**(h)** **Human Trafficking**: Any form of human trafficking or exploitation.
### 3.2 Abuse and Harassment
### 3.2. Abuse and Harassment
Our Services may not be used for:
@@ -140,7 +140,7 @@ Our Services may not be used for:
**(h)** **Discrimination**: Content or behaviour that discriminates against individuals or groups.
### 3.3 Spam and Unsolicited Communications
### 3.3. Spam and Unsolicited Communications
Prohibited spam and unsolicited communication activities include:
@@ -160,7 +160,7 @@ Prohibited spam and unsolicited communication activities include:
**(h)** **Referral Abuse**: Manipulating referral or affiliate programmes through deceptive means.
### 3.4 Technical Abuse and Security Violations
### 3.4. Technical Abuse and Security Violations
Users may not engage in:
@@ -180,7 +180,7 @@ Users may not engage in:
**(h)** **Circumvention**: Bypassing security measures, access controls, or usage limitations.
### 3.5 Intellectual Property Violations
### 3.5. Intellectual Property Violations
Prohibited intellectual property violations include:
@@ -200,7 +200,7 @@ Prohibited intellectual property violations include:
**(h)** **False Attribution**: Misrepresenting the source or ownership of intellectual property.
### 3.6 Harmful Content
### 3.6. Harmful Content
**Reference to Content and Moderation Policy**: Detailed standards for prohibited content, including violent, adult, exploitative, and harmful content, are comprehensively covered in our Content and Moderation Policy, which is incorporated herein by reference.
@@ -208,7 +208,7 @@ Users may not upload, share, or distribute any content that violates the standar
## 4. SPECIFIC PLATFORM USAGE GUIDELINES
### 4.1 Community Platform Usage
### 4.1. Community Platform Usage
When using our community forums, chat services, and interactive platforms:
@@ -228,7 +228,7 @@ When using our community forums, chat services, and interactive platforms:
**(h)** **Language Standards**: Use clear, respectful language appropriate for the community context.
### 4.2 API and Development Tool Usage
### 4.2. API and Development Tool Usage
When using our APIs and development tools:
@@ -248,7 +248,7 @@ When using our APIs and development tools:
**(h)** **Updates**: Stay informed about API changes and update implementations accordingly.
### 4.3 Content Submission and Sharing
### 4.3. Content Submission and Sharing
When submitting or sharing content through our Services:
@@ -270,7 +270,7 @@ When submitting or sharing content through our Services:
## 5. COMMERCIAL AND BUSINESS USE
### 5.1 Permitted Commercial Activities
### 5.1. Permitted Commercial Activities
The following commercial activities are generally permitted when conducted in accordance with applicable terms:
@@ -290,7 +290,7 @@ The following commercial activities are generally permitted when conducted in ac
**(h)** **Research Activities**: Conducting legitimate research or academic studies.
### 5.2 Prohibited Commercial Activities
### 5.2. Prohibited Commercial Activities
The following commercial activities are prohibited:
@@ -310,7 +310,7 @@ The following commercial activities are prohibited:
**(h)** **Brand Confusion**: Using our brand or trademarks in ways that create confusion.
### 5.3 Commercial Use Authorisation
### 5.3. Commercial Use Authorisation
For commercial activities that may require special authorisation:
@@ -332,7 +332,7 @@ For commercial activities that may require special authorisation:
## 6. RESOURCE USAGE AND PERFORMANCE
### 6.1 Fair Use of System Resources
### 6.1. Fair Use of System Resources
Users must:
@@ -352,7 +352,7 @@ Users must:
**(h)** **Graceful Degradation**: Implement graceful degradation when resources are limited.
### 6.2 Prohibited Resource Usage
### 6.2. Prohibited Resource Usage
The following resource usage patterns are prohibited:
@@ -372,7 +372,7 @@ The following resource usage patterns are prohibited:
**(h)** **Storage Abuse**: Using storage services for inappropriate content or excessive backup purposes.
### 6.3 Performance Impact Mitigation
### 6.3. Performance Impact Mitigation
To minimise performance impact on other users:
@@ -394,7 +394,7 @@ To minimise performance impact on other users:
## 7. DATA HANDLING AND PRIVACY
### 7.1 Personal Data Protection
### 7.1. Personal Data Protection
Users must:
@@ -414,7 +414,7 @@ Users must:
**(h)** **Legal Compliance**: Comply with all applicable data protection laws and regulations.
### 7.2 Prohibited Data Practices
### 7.2. Prohibited Data Practices
Users may not:
@@ -434,7 +434,7 @@ Users may not:
**(h)** **Retention Abuse**: Retain personal data longer than necessary or permitted.
### 7.3 Data Security Requirements
### 7.3. Data Security Requirements
When handling data through our services:
@@ -456,7 +456,7 @@ When handling data through our services:
## 8. ENFORCEMENT AND COMPLIANCE
### 8.1 Monitoring and Detection
### 8.1. Monitoring and Detection
We employ various methods to monitor compliance with this AUP:
@@ -476,7 +476,7 @@ We employ various methods to monitor compliance with this AUP:
**(h)** **Behavioural Analysis**: Monitoring for suspicious or harmful behavioural patterns.
### 8.2 Violation Response Procedures
### 8.2. Violation Response Procedures
When violations are identified, we may take the following actions:
@@ -496,7 +496,7 @@ When violations are identified, we may take the following actions:
**(h)** **Law Enforcement**: Report criminal activities to appropriate law enforcement agencies.
### 8.3 Progressive Enforcement
### 8.3. Progressive Enforcement
Our enforcement approach generally follows a progressive model:
@@ -516,7 +516,7 @@ Our enforcement approach generally follows a progressive model:
**(h)** **Repeated Offenders**: Enhanced penalties for users with previous violation history.
### 8.4 Appeals and Review
### 8.4. Appeals and Review
Users may appeal enforcement actions through:
@@ -538,7 +538,7 @@ Users may appeal enforcement actions through:
## 9. REPORTING VIOLATIONS
### 9.1 Community Reporting
### 9.1. Community Reporting
We encourage users to report policy violations through:
@@ -558,7 +558,7 @@ We encourage users to report policy violations through:
**(h)** **Follow-up**: Follow-up communication about report status and outcomes.
### 9.2 What to Include in Reports
### 9.2. What to Include in Reports
Effective violation reports should include:
@@ -578,7 +578,7 @@ Effective violation reports should include:
**(h)** **Contact Information**: Your contact information for follow-up questions.
### 9.3 Reporter Protection
### 9.3. Reporter Protection
We are committed to protecting users who report violations:
@@ -600,7 +600,7 @@ We are committed to protecting users who report violations:
## 10. POLICY UPDATES AND MODIFICATIONS
### 10.1 Right to Modify
### 10.1. Right to Modify
We reserve the right to modify this AUP at any time to:
@@ -620,7 +620,7 @@ We reserve the right to modify this AUP at any time to:
**(h)** **Effectiveness**: Improve the effectiveness of policy enforcement.
### 10.2 Notification of Changes
### 10.2. Notification of Changes
Material changes to this AUP will be communicated through:
@@ -636,11 +636,11 @@ Material changes to this AUP will be communicated through:
**(f)** **Version History**: Maintained version history of policy changes;
**(g)** **Effective Date Notice**: Clear indication of when changes become effective;
**(g)** **Change Notice**: Clear indication of when changes become effective;
**(h)** **Transition Periods**: Reasonable transition periods for compliance with new requirements.
### 10.3 User Response to Changes
### 10.3. User Response to Changes
Following notification of policy changes:
@@ -662,7 +662,7 @@ Following notification of policy changes:
## 11. CONTACT INFORMATION AND SUPPORT
### 11.1 Policy Questions and Clarifications
### 11.1. Policy Questions and Clarifications
For questions about this AUP:
@@ -672,7 +672,7 @@ For questions about this AUP:
**Response Time:** Within 3 business days for policy clarification requests
### 11.2 Violation Reporting
### 11.2. Violation Reporting
To report policy violations:
@@ -682,7 +682,7 @@ To report policy violations:
**Response Time:** Within 24 hours for urgent safety issues, 48 hours for standard reports
### 11.3 Appeals and Disputes
### 11.3. Appeals and Disputes
For appeals related to AUP enforcement:
@@ -692,24 +692,16 @@ For appeals related to AUP enforcement:
**Process:** Follow our Community Appeals Policy procedures
### 11.4 Technical Support
### 11.4. Technical Support
For technical issues related to policy compliance:
**Email:** support@nhcarrigan.com
**Community Forum:** https://forum.nhcarrigan.com
**Discord Community:** https://chat.nhcarrigan.com
**Response Time:** Within 48 hours for technical support requests
**Document Version:** 1.0
**Last Updated:** 15 September 2025
**Effective Date:** 15 September 2025
**Next Review Date:** 15 September 2026
---
*This Acceptable Use Policy establishes comprehensive guidelines for appropriate use of our services. By using our Services, you agree to comply with these usage standards and acknowledge that violations may result in service restrictions or termination. For questions about acceptable use or to report violations, please contact us at aup@nhcarrigan.com.*