← Back to Home
Acceptable Use Policy
Prohibited Uses & Enforcement | Last Updated: October 29, 2025
📜 Policy Overview
This Acceptable Use Policy ("AUP") governs your use of s4™ Security Suite software and services. By using s4™, you agree to comply with this policy. Violations may result in account suspension or termination without refund.
✅ Permitted Uses
Personal Use
- Protecting your personal devices and network
- Securing your internet connection via VPN
- Monitoring your own network for threats
- Privacy protection while browsing
- Malware scanning on your devices
Commercial Use (Professional/Enterprise)
- Protecting business networks and devices
- Employee security and privacy
- Corporate threat intelligence
- Secure remote access for authorized users
- Compliance with security regulations
- Security auditing and monitoring
Security Research (With Permission)
- Responsible vulnerability testing (see Security Disclosure)
- Academic research with proper authorization
- Security education and training
- Compliance testing on your own infrastructure
🚫 Prohibited Uses
The following activities are STRICTLY PROHIBITED:
1️⃣ Illegal Activities
- Criminal Activity: Using s4™ for any illegal purpose under local, state, federal, or international law
- Fraud: Credit card fraud, identity theft, phishing, or financial crimes
- Child Exploitation: Any content involving minors (ZERO TOLERANCE)
- Terrorism: Planning, promoting, or conducting terrorist activities
- Human Trafficking: Facilitating or engaging in human trafficking
- Drug Trafficking: Illegal sale, distribution, or trafficking of controlled substances
- Weapon Sales: Illegal firearms, explosives, or weapons trafficking
2️⃣ Hacking & Unauthorized Access
- Unauthorized Access: Hacking into systems, networks, or accounts without permission
- Network Scanning: Unauthorized port scanning or vulnerability scanning of third-party networks
- DDoS Attacks: Distributed denial of service or any attacks disrupting services
- Botnet Operation: Creating, operating, or controlling botnets
- Credential Stuffing: Automated login attempts with stolen credentials
- Exploitation: Exploiting vulnerabilities in systems without authorization
3️⃣ Intellectual Property Violations
- Software Piracy: Distributing cracked, pirated, or stolen software
- Copyright Infringement: Sharing copyrighted content without authorization
- Trademark Violation: Unauthorized use of trademarks or brand names
- License Sharing: Sharing s4™ license keys or accounts
- Reverse Engineering: Decompiling, disassembling, or cracking s4™ software
- Reselling: Unauthorized resale or redistribution of s4™ licenses
4️⃣ Abuse & Harassment
- Harassment: Cyberbullying, stalking, or threatening individuals
- Doxxing: Publishing private personal information without consent
- Hate Speech: Content promoting violence or hatred based on race, religion, gender, etc.
- Impersonation: Pretending to be another person or entity
- Spam: Mass unsolicited communications or spam campaigns
5️⃣ Malware & Malicious Code
- Malware Distribution: Creating, distributing, or hosting viruses, trojans, ransomware
- Cryptojacking: Unauthorized use of computing resources for cryptocurrency mining
- Backdoors: Installing unauthorized backdoors or remote access tools
- Keyloggers: Deploying keyloggers or spyware without consent
- Data Theft: Stealing data from systems or users
6️⃣ Network Abuse
- Bandwidth Abuse: Excessive bandwidth consumption affecting other users
- Proxy/VPN Abuse: Using VPN for illegal activities or ToS violations on third-party services
- Torrent Abuse: Illegal torrenting of copyrighted content
- Port Scanning: Unauthorized scanning of networks or systems
- Resource Exhaustion: Intentionally depleting system resources
7️⃣ Fraudulent Activities
- Payment Fraud: Using stolen credit cards or fraudulent payment methods
- Chargeback Fraud: Abuse of chargeback/refund systems
- Account Sharing: Sharing accounts to exceed license limits
- Trial Abuse: Creating multiple accounts to abuse trial period
- Price Manipulation: Exploiting pricing errors or vulnerabilities
8️⃣ Circumvention & Tampering
- License Cracking: Bypassing or cracking license activation
- Certificate Pinning Bypass: Attempting to bypass security measures
- Anti-Debug Bypass: Circumventing anti-tampering protections
- API Abuse: Abusing API endpoints or rate limits
- Security Evasion: Attempting to evade security controls
⚖️ Enforcement & Consequences
Violation Response
When we detect AUP violations, we may take the following actions:
- Warning: First-time minor violations receive a warning
- Temporary Suspension: 7-30 day account suspension for moderate violations
- Permanent Ban: Immediate termination for severe violations (no refund)
- Legal Action: Criminal violations reported to law enforcement
- Service Termination: All services disabled, data deleted per retention policy
Severity Classification
🔴 CRITICAL - Immediate Permanent Ban
- Child exploitation content (reported to NCMEC & FBI)
- Terrorism or violent extremism
- Human trafficking
- DDoS attacks or botnets
- Malware distribution
🟠 HIGH - Suspension or Ban
- Hacking or unauthorized access
- Large-scale copyright infringement
- Fraud or financial crimes
- Harassment or doxxing
- License cracking or circumvention
🟡 MEDIUM - Warning or Temporary Suspension
- License sharing
- Minor copyright violations
- Spam or abuse reports
- Trial period abuse
- API rate limit violations
🟢 LOW - Warning Only
- Unintentional ToS violations
- Minor technical violations
- First-time accidental breaches
🚨 Reporting Violations
How to Report
If you witness AUP violations by other users, please report them:
Abuse Reports
Email: [email protected]
Include: Description, evidence (screenshots, URLs), date/time
Emergency/Critical Issues
Email: [email protected]
For: Child exploitation, terrorism, immediate threats
Legal Department
Email: [email protected]
For: Legal inquiries, law enforcement requests
Anonymous Reporting
We accept anonymous reports. However, providing contact information helps us investigate more effectively.
🛡️ Our Monitoring & Detection
Automated Systems
- Behavioral Analysis: Detecting unusual activity patterns
- Threat Intelligence: Monitoring for known malicious indicators
- Rate Limiting: Preventing abuse through automated limits
- License Validation: Detecting cracked or shared licenses
- Anomaly Detection: Machine learning-based abuse detection
Human Review
Reported violations are reviewed by our Trust & Safety team. We investigate thoroughly before taking action.
📋 Law Enforcement Cooperation
Legal Compliance
We cooperate with law enforcement agencies investigating criminal activity. We may provide:
- Account information (with valid legal process)
- Connection logs (limited to what we collect)
- License activation data
- Payment information (with subpoena/warrant)
NCMEC Reporting
Child exploitation content is immediately reported to the National Center for Missing & Exploited Children (NCMEC) and FBI, as required by 18 U.S.C. § 2258A.
Transparency
We publish annual transparency reports detailing law enforcement requests. See Transparency Report (published annually).
⚠️ VPN-Specific Policies
Zero-Log Policy Clarification
While we maintain a zero-log policy for VPN connections, we reserve the right to terminate service for AUP violations detected through other means (abuse reports, external complaints, etc.).
Third-Party Service Compliance
You are responsible for complying with terms of service of websites and services you access through our VPN. Violating third-party ToS (e.g., Netflix terms, forum rules) is not our responsibility, but may affect your s4™ account if it involves illegal activity.
🔄 Appeals Process
If Your Account Was Suspended
- Email [email protected] within 14 days
- Include: Account email, suspension reason, explanation
- We review appeals within 5-7 business days
- Decision is final unless new evidence emerges
No Refund for Violations
Accounts terminated for AUP violations are not eligible for refunds. This includes both partial and full refunds.
📚 Related Policies
🔔 Policy Updates
We may update this AUP at any time. Major changes will be communicated via:
- Email notification
- In-app notification
- Website banner
Continued use after changes constitutes acceptance.
Remember: s4™ is designed to protect your security and privacy, not to facilitate illegal activities.
Use our software responsibly and ethically.
s4™ Corporation · Trust & Safety Team · Last Updated: October 29, 2025
← Back to Home