ACCEPTABLE USE OF POLICY
Summary
This policy constitutes a binding agreement established to protect the security, integrity, and reliability of Heylean's services, network, and resources. By using our Services, you irrevocably agree to abide by the terms set forth in this policy.
- Illegal Activities: Our services may not be used for any illegal, fraudulent, or harmful purposes. This includes, but is not limited to, crimes such as the financing of terrorism, human trafficking, and child exploitation.
- System Security: Any attempt to gain unauthorized access to our systems or other users' accounts, to compromise network integrity, or to cause a service disruption is strictly prohibited.
- Prohibited Content: The distribution of content that includes hate speech, harassment, threats, disinformation, malware, or infringes upon the intellectual property rights of others is prohibited.
- Sole Responsibility: You are solely responsible for all activities conducted and content uploaded through your account, whether authorized or unauthorized.
- Enforcement: Violation of this policy may result in the immediate suspension or permanent termination of your account without prior notice, forfeiture of any refunds, and referral to the appropriate law enforcement authorities.
Article 1: Purpose and Legal Binding of the Policy
This Acceptable Use Policy ("Policy" or "AUP") is established to ensure the responsible use of all services, products, websites, APIs, networks, and systems (collectively, the "Services") of Heylean International, Inc. and its affiliates ("Heylean," "the Company," "We," "Us") by all users ("User," "You").
This Policy aims to protect the integrity, security, availability, and reputation of our Services; to prevent illegal, harmful, or malicious activities; and to ensure a fair environment for all our users. This Policy constitutes an integral and binding part of the Heylean Terms of Conditions ("Agreement"). A violation of this Policy will be considered a material breach of the Agreement. By using our Services, you agree and commit to comply with this Policy.
Article 2: General Principles and Sole Responsibility
When using our Services, you are obligated to adhere to the following general principles:
- Absolute Compliance with Laws: You must use the Services in full compliance with all applicable laws, statutes, and regulations, including but not limited to those of your jurisdiction, the Republic of Turkey, the United States, and relevant international law.
- Sole Responsibility: You are solely responsible for all actions, communications, and all content uploaded, created, or shared ("User Content") through your account, whether by you or by any third party who has gained access to your account (whether such access was authorized or unauthorized). Ignorance of this Policy does not constitute an excuse.
- Respect for the Rights of Others: You must respect the intellectual property rights, privacy, confidentiality, and other legal rights of other users, third parties, and Heylean.
Article 3: Prohibited Use Categories and Activities
The conduct, promotion, or facilitation of the following activities through our Services is strictly prohibited. This list is illustrative and not exhaustive; Heylean reserves the sole discretion to determine whether an activity violates this Policy.
3.1. Illegal, Harmful, and Fraudulent Activities
- Activities that violate any local, national, or international law or regulation. This includes financial crimes (such as money laundering, terrorist financing), human trafficking, illegal gambling, and the sale of controlled substances.
- Any content that promotes, depicts, solicits, or distributes child exploitation or abuse, including Child Sexual Abuse Material (CSAM). A zero-tolerance policy is enforced on this matter, and such activities will be immediately reported to the appropriate national and international law enforcement authorities (including NCMEC).
- Actions that promote, facilitate, plan, or support terrorism, violent extremism, or organized criminal activity.
- Fraud, phishing, impersonation, deceptive marketing practices, or any scheme intended to deceive others.
- Threatening, harassing, bullying, or inciting violence or self-harm against others.
- Disseminating hate speech that promotes violence, discrimination, or disparagement against individuals or groups based on race, ethnicity, religion, gender, sexual orientation, disability, or other protected statuses.
3.2. Violation of System and Network Security
- Gaining or attempting to gain unauthorized access to any system, network, service, or account (hacking).
- Scanning, probing, or vulnerability testing of networks or systems without the express written permission of Heylean.
- Actions intended to deny, degrade, or overload service to any user, host, or network (Denial of Service (DoS) / Distributed Denial of Service (DDoS) attacks).
- Distributing, hosting, or executing malware (including viruses, worms, spyware, ransomware, keyloggers, etc.).
- Interfering with or circumventing the normal operation or authentication mechanisms of the Services.
- Forging or misrepresenting email headers, IP addresses, or other network identifiers (spoofing).
3.3. Content, Intellectual Property, and Privacy Violations
- Uploading, sharing, or distributing content that infringes upon copyright, trademark, patent, trade secret, or other proprietary rights, or promoting counterfeit goods.
- Disclosing the personal or confidential information of others (including financial information, identity documents, private communications, or medical records) without their legal consent (doxing).
- Intentionally disseminating false or misleading information (disinformation) with the intent to cause harm, deceive, or disrupt public order.
3.4. Abuse of Services and Resources
- Sending unsolicited bulk email or messages (spam), chain letters, or pyramid schemes.
- Using the Services in a manner that consumes disproportionate or excessive resources, thereby interfering with the fair use of other users.
- Engaging in activities that require intensive and continuous computation for purposes other than the intended use of the service, such as cryptocurrency mining, without the express permission of Heylean.
- Creating accounts or accessing services in bulk through automated scripts or bots.
Article 4: Restrictions on High-Risk and Sensitive End-Uses
Consistent with Heylean's mission and legal commitments, the use of our Services for the following purposes, or to support activities related to them, is strictly prohibited:
- The development, design, production, testing, or use of conventional weapons; nuclear, chemical, or biological weapons (weapons of mass destruction); unmanned aerial vehicles (UAVs); or ballistic missiles.
- The planning or execution of cyberattacks that could compromise or disrupt the operation of critical infrastructure (e.g., power plants, water networks, transportation systems, financial networks).
- The development or implementation of mass surveillance, unlawful wiretapping, or social scoring systems that violate international human rights law.
- Any activity that violates U.S. and international trade, sanctions, and export control laws (including but not limited to ITAR and EAR), as detailed in Article 9 of our Terms of Use.
Article 5: Investigation of Policy Violations and Enforcement
Heylean reserves the right to investigate any alleged violations of this Policy and to determine, in its sole discretion, whether a violation has occurred.
Upon identifying a violation, Heylean reserves the right to take one or more of the following enforcement actions, without prior notice, depending on the severity and nature of the violation:
- Immediate removal of or disabling access to the infringing content.
- Issuing a warning to the User.
- Temporary suspension of access to the Services.
- Permanent termination of the account and access to the Services. In such an event, no refund will be provided to the User.
- Reporting the activity to and fully cooperating with domestic and international law enforcement or other appropriate authorities (including police, prosecutors, and administrative bodies) when deemed necessary.
Heylean cannot be held liable for any direct or indirect damages you may suffer as a result of a violation of this Policy. Furthermore, you agree to indemnify Heylean for any and all damages, losses, administrative fines, and expenses (including reasonable attorneys' fees) arising from your violation.
Article 6: Reporting Violations
If you encounter a situation that you believe violates this Policy while using our Services, you are encouraged to report it to us immediately. Violation reports should be sent to the following address with as much evidence as possible (e.g., full email headers, log files, screenshots, URLs):
Electronic Mail: aup.external.unclassified@heylean.com (We can currently only process inquiries submitted in English)
We will review all reports with seriousness and in confidence. However, to protect the privacy of our investigation, we may not be able to provide you with information regarding the status or outcome of our inquiry.
Article 7: General Provisions
7.1. Changes to the Policy
Heylean reserves the right to modify this Policy at any time in its sole discretion to reflect changes in legal requirements, technological advancements, or business needs. Changes become effective immediately upon being posted on this page. Your continued use of the Services after changes are posted constitutes your acceptance of the modified Policy.
7.2. No Waiver
Heylean's failure to enforce any provision or right of this Policy in a particular instance shall not be construed as a waiver of such provision or right in general or in any future instance.
7.3. Severability
If any provision of this Policy is found by a court of competent jurisdiction to be invalid or unenforceable, that provision will be severed from the Agreement, and the remaining provisions will remain in full force and effect.