Overview
Rules against unlawful use, abuse, spam, infrastructure misuse, harmful content, and platform interference.
1. Prohibited activity
- Illegal activity, fraud, deceptive practices, or unlawful content distribution.
- Harassment, threats, abuse, or attempts to harm other users, customers, or third parties.
- Use of the services to violate privacy, intellectual property rights, or regulatory obligations.
2. Infrastructure misuse
- Attempting unauthorized access, probing, scanning, or bypassing access controls.
- Launching denial-of-service attacks, malware delivery, credential stuffing, or exploit activity.
- Using platform resources in a way that materially degrades service reliability for others.
3. Communications abuse
- Spam, phishing, unwanted bulk messaging, or sender identity manipulation.
- Voice, telephony, or messaging activity that violates consent, notice, or anti-abuse rules.
4. Hosted content restrictions
Customers remain responsible for the content, software, and traffic they host or transmit through MigraTeck services.
- Do not host malware, botnet infrastructure, credential theft tooling, or prohibited exploit content.
- Do not use hosting services for unlawful marketplaces, abusive campaigns, or illegal distribution.
5. Enforcement
MigraTeck may investigate suspected violations and take protective action, including warnings, suspension, throttling, removal, or termination.