Acceptable Use Policy
Effective April 28, 2025
Article 1 (Purpose)
This Acceptable Use Policy (hereinafter “AUP”) establishes the standards for ensuring appropriate and lawful use of the cloud service “Synapus” (hereinafter “Service”) provided by Alpaon LLC (hereinafter “Company”). This policy constitutes part of the Terms of Service and applies to all users.
Article 2 (Scope of Application)
This policy applies to all users of the Company’s Service and any third parties to whom users have granted access. Users are responsible for the actions of any third parties to whom they have granted access.
Article 3 (Prohibited Activities)
Users shall not engage in any of the following activities when using the Service:
1. Illegal Activities
- Violating the laws of the Republic of Korea or the laws of any country where the Service is provided
- Storing, distributing, or transmitting illegal content such as child sexual abuse material (CSAM)
- Infringing on the intellectual property rights of others, including copyrights, trademarks, and patents
- Engaging in fraud, phishing, financial crimes, or other illegal acquisition of money
- Operating illegal businesses such as gambling, illegal drug trafficking, or weapons trading
- Collecting, processing, or disclosing personal information in violation of privacy laws
2. Network and System Security Violations
- Attempting unauthorized access to systems, networks, or data of the Company or third parties
- Conducting denial of service attacks (DoS/DDoS) or operating tools for such attacks
- Developing, distributing, or hosting malware, viruses, or ransomware
- Conducting security tests such as port scanning or vulnerability scanning without consent of the Company or third parties
- Engaging in network interception activities such as packet sniffing or traffic interception
- Operating botnets or establishing command and control (C&C) servers
- Circumventing security mechanisms such as authentication bypass or privilege escalation
3. Spam and Malicious Communications
- Sending bulk unsolicited emails (spam) without recipient consent
- Engaging in fraudulent communications such as phishing, smishing, or voice phishing
- Sending emails or messages using false sender information
- Engaging in communication disruption activities such as email bombs or SMS bombs
- Operating services that can be exploited for spam distribution, such as open relays or open proxies
4. Service Abuse and Interference
- Causing excessive load on the Company’s infrastructure, network, or systems
- Interfering with or degrading the service performance of other users
- Abnormally consuming service resources through automated methods
- Using the Service for cryptocurrency mining (unless prior written approval is obtained from the Company)
- Circumventing or disabling technical limitations of the Service
- Operating services that facilitate copyright infringement, such as torrent seedboxes
5. Harmful Content
- Posting or distributing content that defames, insults, or damages the reputation of others
- Content that promotes violence, terrorism, or hatred
- Content related to illegal gambling or games of chance
- Other content that violates public order and morals
6. Impersonation and Deception
- Impersonating the Company, other individuals, or other organizations
- Providing false information when registering for the Service
- Abusing the Service or evading sanctions through multiple accounts
- Engaging in deceptive activities to circumvent Company policies or terms
Article 4 (Resource Usage Limits)
- Users shall use service resources within reasonable limits and take care not to affect the service usage of other users.
- The Company may apply the following restrictions for stable service operation:
- Network bandwidth limits
- CPU, memory, and storage usage limits
- Concurrent connection limits
- API call rate limits
- If a user’s resource usage affects other users or compromises the overall stability of the Service, the Company may restrict such resource usage without prior notice.
Article 5 (Security Requirements)
- Users are responsible for maintaining the security of their accounts, servers, and applications.
- Users shall comply with the following:
- Use strong passwords and change them regularly
- Apply security updates to operating systems and software
- Block unnecessary ports and services
- Apply the principle of least privilege for access rights
- Users are responsible for any damage caused to third parties if their services are exploited due to security vulnerabilities.
Article 6 (Monitoring and Investigation)
- The Company may monitor service usage to verify compliance with this policy.
- The Company may request relevant information from users when policy violations are suspected, and users shall cooperate with such requests.
- The Company may provide necessary information to investigative agencies when required by law.
Article 7 (Actions for Violations)
- The Company may take the following actions against users who violate this policy:
- Warning notice
- Restriction of specific features or services
- Network disconnection or bandwidth throttling
- Deletion or blocking of violating content
- Service suspension
- Termination of service agreement
- In emergency situations or when violations may cause serious harm to the Company or third parties, the Company may take immediate action without prior notice.
- If the Company suffers damages due to policy violations, the Company may claim compensation from the user.
- The level of action will be determined considering the severity of the violation, repetition, and the user’s remediation efforts.
Article 8 (Violation Reports and Processing)
- Company’s Position: As an information intermediary under the Act on Promotion of Information and Communications Network Utilization and Information Protection and the Telecommunications Business Act, the Company is not obligated to pre-screen or continuously monitor the content of information stored or transmitted by users through the Service.
- Reporting Method: If you discover any violation of this policy or illegal information, you may report it to the following contact:
- Email: abuse@alpaon.com
- Required Information for Reports: Please provide the following information when reporting to facilitate prompt processing:
- Name (or organization name) and contact information of the reporter
- Location of the violation or illegal information (URL, IP address, etc.)
- Type and specific details of the violation
- Materials demonstrating that the information is illegal (if applicable)
- In case of rights infringement, materials proving that you are the rights holder
- Processing Procedures and Timeframes: When the Company receives a report, it will be processed as follows:
- Cases Requiring Urgent Action: For illegal information requiring urgent action, such as CSAM, terrorism-related content, or obvious criminal activity, the Company may block access to or delete such information and immediately suspend the relevant user’s service without delay (within 24 hours at the latest) after receiving the report.
- General Cases: For other reports, the Company will review the content within 3 business days from receipt, and if a violation is confirmed, take appropriate measures such as deleting or blocking the information, warning the user, restricting service use, or terminating the agreement.
- Cases Difficult to Determine: If it is difficult to determine whether a violation has occurred, the Company may consult with relevant authorities or conduct legal review to decide on action, and in such cases, the processing timeframe may be extended.
- Notification to Users: When the Company takes action such as deletion or blocking of a user’s information, it will notify the user of the action and reasons. However, notification may be withheld if requested by investigative agencies or if notification may lead to destruction of evidence.
- Appeals: Users who object to the Company’s action may file a written appeal within 7 days of receiving the action notice. The Company will review the appeal and notify the user of the result within 14 days.
- Cooperation with Investigative Agencies: The Company will cooperate in accordance with applicable laws when it receives a lawful request for data submission from investigative agencies.
- Disclaimer: If the Company receives a report and takes appropriate action in accordance with this Article, the Company shall not be liable for damages to third parties caused by the user’s violation. Additionally, the Company shall not be liable if illegal information was stored or transmitted through the Service without the Company’s knowledge.
Article 9 (Policy Changes)
- The Company may revise this policy in accordance with changes in relevant laws or service environment.
- When the policy is changed, the Company will post the changes on the service website.
- The revised policy will take effect from the announced effective date.
Article 10 (Miscellaneous)
- Matters not specified in this policy shall be governed by the Terms of Service and applicable laws.
- In case of conflict between this policy and the Terms of Service, this policy shall prevail.