Legal policy

MigraTeck Acceptable Use Policy

The operational and conduct rules that protect MigraTeck infrastructure, customers, communications systems, and hosted services.

Last updated April 12, 2026v1.0Entity: MigraTeck

Overview

Rules against unlawful use, abuse, spam, infrastructure misuse, harmful content, and platform interference.

1. Prohibited activity

  • Illegal activity, fraud, deceptive practices, or unlawful content distribution.
  • Harassment, threats, abuse, or attempts to harm other users, customers, or third parties.
  • Use of the services to violate privacy, intellectual property rights, or regulatory obligations.

2. Infrastructure misuse

  • Attempting unauthorized access, probing, scanning, or bypassing access controls.
  • Launching denial-of-service attacks, malware delivery, credential stuffing, or exploit activity.
  • Using platform resources in a way that materially degrades service reliability for others.

3. Communications abuse

  • Spam, phishing, unwanted bulk messaging, or sender identity manipulation.
  • Voice, telephony, or messaging activity that violates consent, notice, or anti-abuse rules.

4. Hosted content restrictions

Customers remain responsible for the content, software, and traffic they host or transmit through MigraTeck services.

  • Do not host malware, botnet infrastructure, credential theft tooling, or prohibited exploit content.
  • Do not use hosting services for unlawful marketplaces, abusive campaigns, or illegal distribution.

5. Enforcement

MigraTeck may investigate suspected violations and take protective action, including warnings, suspension, throttling, removal, or termination.