Acceptable Use Policy
Effective Date: December 5, 2025
1. Introduction
This Acceptable Use Policy ("AUP") governs your use of Varity Inc.'s ("Varity," "we," "us," or "our") services, including our AI Dashboard platform, decentralized infrastructure, APIs, SDKs, and related services (collectively, the "Services"). This AUP is incorporated into and forms part of our Terms of Service.
By using our Services, you agree to comply with this AUP. We may modify this AUP at any time by posting the revised version on our website. Continued use of the Services after such modifications constitutes acceptance of the updated AUP.
Important: While Varity's decentralized architecture means we cannot access the encrypted content of your data, we can observe metadata, access patterns, and resource usage. Violations of this AUP may result in account suspension or termination.
2. General Principles
Your use of the Services must comply with the following principles:
- Lawful Use: Use the Services only for lawful purposes and in compliance with all applicable laws and regulations
- Respect for Others: Do not interfere with or disrupt other users' access to or use of the Services
- Security: Maintain the security of your account and take reasonable steps to prevent unauthorized access
- Integrity: Do not attempt to circumvent, disable, or interfere with security features of the Services
- Responsibility: You are responsible for all activities that occur under your account
3. Prohibited Uses - Illegal Activities
You may not use the Services to engage in, facilitate, or promote any illegal activities, including but not limited to:
3.1 Criminal Activities
- Fraud, theft, or financial crimes
- Money laundering or terrorist financing
- Tax evasion or other violations of tax law
- Trafficking in illegal goods or services
- Human trafficking or exploitation
- Child sexual abuse material (CSAM)
- Illegal gambling operations
3.2 Regulatory Violations
- Violating sanctions, export controls, or trade restrictions
- Unregistered securities offerings or securities fraud
- Operating without required licenses or permits
- Violating privacy laws (GDPR, CCPA, HIPAA, etc.)
- Anti-money laundering (AML) or know-your-customer (KYC) violations
3.3 Intellectual Property Violations
- Copyright infringement or piracy
- Trademark infringement or counterfeiting
- Patent infringement
- Trade secret theft
- Distribution of circumvention tools (DMCA violations)
4. Prohibited Uses - Harmful Content
You may not use the Services to store, process, transmit, or distribute:
4.1 Harmful or Abusive Content
- Content that promotes violence, terrorism, or extremism
- Hate speech targeting individuals or groups based on protected characteristics
- Content that harasses, threatens, defames, or intimidates individuals
- Non-consensual intimate imagery
- Content promoting self-harm or suicide
- Disinformation campaigns designed to mislead or manipulate
4.2 Malicious Content
- Viruses, worms, Trojan horses, or other malware
- Ransomware or cryptolocker software
- Phishing kits or credential harvesting tools
- Botnets, command-and-control infrastructure, or zombie networks
- Exploit kits or vulnerability scanners used for malicious purposes
- Spam distribution software or tools
4.3 Deceptive Content
- Fraudulent websites or applications
- Impersonation of individuals, companies, or government agencies
- Fake reviews, testimonials, or endorsements
- Artificially inflated metrics or engagement
5. Security Violations
You may not engage in activities that compromise the security or integrity of our Services or third-party systems:
5.1 Unauthorized Access
- Accessing systems, data, or accounts without authorization
- Attempting to probe, scan, or test vulnerabilities of any system
- Circumventing authentication or security controls
- Using stolen credentials or impersonating other users
- Intercepting, monitoring, or tampering with communications without consent
5.2 Service Disruption
- Distributed denial-of-service (DDoS) attacks
- Intentionally overloading or disrupting our infrastructure
- Interfering with the proper functioning of the Services
- Introducing malicious code into our systems
- Attempting to degrade performance for other users
5.3 Blockchain-Specific Violations
- Exploiting smart contract vulnerabilities for personal gain
- Front-running or sandwich attacks on other users' transactions
- Attempting to manipulate consensus or validation mechanisms
- Creating or distributing tools for blockchain exploitation
6. Resource Abuse
You must use our resources responsibly and within the limits of your subscription tier:
6.1 Compute Resources
- Do not exceed your allocated compute resources (CPU, memory, GPU)
- Do not run cryptocurrency mining without explicit authorization
- Do not run computationally intensive workloads designed to abuse shared resources
- Do not use automated scripts that excessively consume API rate limits
6.2 Storage Resources
- Do not exceed your allocated storage quota
- Do not use the Services primarily as a file hosting or backup service
- Do not store large amounts of data unrelated to legitimate business use
- Do not upload excessive duplicate content
6.3 Network Resources
- Do not exceed your allocated bandwidth
- Do not use the Services to operate high-traffic CDN or proxy services
- Do not use the Services to relay large volumes of traffic through third-party systems
7. AI and LLM Usage
Special guidelines apply to the use of our AI Dashboard and LLM features:
7.1 Prohibited AI Uses
- Generating content that violates Section 4 (Harmful Content)
- Attempting to jailbreak, bypass, or circumvent AI safety measures
- Using AI to create deepfakes or synthetic media for deceptive purposes
- Automated generation of spam or misleading content at scale
- Using AI to evade detection of prohibited activities
- Training competing AI models using our API outputs
7.2 Responsible AI Use
- Clearly disclose AI-generated content when required by law or platform policies
- Do not represent AI outputs as human-generated work when disclosure is required
- Review AI outputs before making critical business decisions
- Do not rely on AI for medical, legal, or financial advice without professional review
8. Email and Communications
If you use our Services to send emails or other communications:
- Comply with all applicable anti-spam laws (CAN-SPAM, CASL, GDPR, etc.)
- Only send emails to recipients who have opted in to receive them
- Include accurate sender information and valid unsubscribe mechanisms
- Do not send unsolicited bulk email (spam)
- Do not forge headers or manipulate identifiers to disguise the origin of messages
- Do not harvest email addresses from websites or services without consent
- Maintain bounce and complaint rates within acceptable thresholds
9. Third-Party Integrations
When using our Services to integrate with third-party platforms:
- Comply with the terms of service and acceptable use policies of integrated platforms
- Do not use integrations to scrape, harvest, or extract data without authorization
- Do not exceed API rate limits of integrated services
- Obtain proper authorization before accessing third-party data
- Respect the privacy and data protection requirements of integrated platforms
10. Enforcement
10.1 Monitoring and Detection
While we respect your privacy and cannot access encrypted content, we may monitor:
- Resource usage patterns and consumption metrics
- API access patterns and rate limit compliance
- Network traffic patterns and volumes
- Blockchain transaction patterns
- User reports and complaints
- Publicly visible information
10.2 Consequences of Violations
Violations of this AUP may result in:
- Warning: Written notice of the violation with required corrective action
- Throttling: Temporary reduction of resource limits
- Suspension: Temporary suspension of account access
- Termination: Permanent termination of your account without refund
- Legal Action: Referral to law enforcement or initiation of civil proceedings
The severity of our response will depend on the nature, severity, and frequency of violations. We reserve the right to take immediate action without prior warning for severe violations.
10.3 Appeals
If you believe your account was suspended or terminated in error, you may appeal by contacting hello@varity.so within 30 days. Include your account details and an explanation of why you believe the action was taken in error.
11. Reporting Violations
If you become aware of any violation of this AUP, please report it to us:
- Email: hello@varity.so
- Security Issues: hello@varity.so
- DMCA/Copyright: hello@varity.so
When reporting, please include:
- Description of the violation
- Relevant URLs, account identifiers, or transaction hashes
- Evidence supporting your report (screenshots, logs, etc.)
- Your contact information for follow-up
We take all reports seriously and will investigate promptly. However, we cannot guarantee specific outcomes or share details of our enforcement actions due to privacy considerations.
12. Cooperation with Authorities
We may cooperate with law enforcement and regulatory authorities:
- When required by valid legal process (subpoenas, court orders, etc.)
- To investigate potential criminal activity
- To protect the safety of individuals
- To protect our rights, property, and the integrity of the Services
Important: Due to our encryption architecture, we cannot provide decrypted user data to authorities - we do not possess decryption keys. We can only provide metadata, access logs, and account information.
13. Modifications to This Policy
We may update this Acceptable Use Policy from time to time. Changes will be effective when posted on our website with an updated effective date. For material changes, we will provide notice via email or in-app notification.
Your continued use of the Services after changes become effective constitutes acceptance of the updated AUP.
14. Contact Information
For questions about this Acceptable Use Policy, please contact us:
- General Inquiries: hello@varity.so
- Abuse Reports: hello@varity.so
- Security Issues: hello@varity.so
- DMCA/Copyright: hello@varity.so
15. Related Policies
This Acceptable Use Policy should be read in conjunction with:
- Terms of Service - Governs your overall use of our Services
- Privacy Policy - Explains how we handle your personal information