Acceptable Use Policy
This Acceptable Use Policy (“AUP”) governs how users may access and use BRidge. It forms part of the Terms and EULA. Violations may result in throttling, suspension, or termination.
Short version: Use BRidge for legitimate commercial workflows. Don’t break laws, abuse resources, redistribute non-public market data, or attempt to manipulate markets or defeat controls.
Table of Contents
1.Lawful Use
- Use BRidge only for lawful commercial purposes consistent with applicable regulations and your internal policies.
- Comply with antitrust/competition laws; no collusion or unfair practices.
- No use in life-support, emergency services, or other high-risk environments where failure could reasonably result in death, personal injury, or severe environmental damage.
2.Security & Abuse
- No introducing malware, exploits, or load intended to degrade BRidge or third-party services.
- No bypassing authentication, entitlements, idempotency, or kill-switches.
- No unauthorized access to accounts, data, or non-public endpoints; no credential sharing outside your organization.
- No scraping or bulk extraction of data beyond provided exports/APIs.
- No reselling, renting, or sublicensing access; maintain least-privilege access.
- Operational Monitoring: You consent to reasonable monitoring, logging, and rate-limiting necessary to operate and secure BRidge. We may investigate suspected violations, including reviewing logs and headers.
3.Prohibited Content & Conduct
- Illegal content, harassment, hate, threats, doxxing, or violation of privacy rights.
- Infringing uploads or misuse of others’ IP (see DMCA process).
- Deceptive practices, misrepresentation of identity, or falsified records (e.g., BOLs, signatures).
4.Market Integrity & Data Use
- No spoofing-like behavior, wash-like trading, or attempts to manipulate pricing or indices.
- Reference prices and Derived Data shown in BRidge are for internal operational use only unless expressly licensed for redistribution.
- Respect surveillance and audit features; do not attempt to disable logging or chain seals.
- No attempts to circumvent metering, billing, or usage-based fees (e.g., by masking call origins or rotating identities).
5.APIs, Automation & Rate Limits
- Use issued API keys responsibly; keep them confidential.
- Comply with rate limits, idempotency keys, and fair-use guidelines. We may throttle or block abusive patterns.
- No automated account creation or credential stuffing.
- Automated clients must identify via a standard
User-Agent and, when feasible, include contact information for operational issues.
6.Sanctions, KYC/AML & Export
- No use by or for sanctioned parties or embargoed jurisdictions.
- Do not use BRidge to evade KYC/AML obligations or submit knowingly false compliance attestations.
- Follow export control laws when transferring software/data across borders.
7.Security Research (Safe Harbor)
Good-faith testing in your own tenant that does not harm other tenants is permitted. Do not test shared production endpoints, attempt denial-of-service, or access data you do not own. Report vulnerabilities to info@atlasipholdingsllc.com; we will not pursue legal action for good-faith reports that comply with this AUP.
Scope limits: Safe Harbor does not permit traffic flooding, production DoS, scanning of shared endpoints, or testing that degrades service. Atlas may revoke Safe Harbor if activity degrades service or risks data.
Notification duty: If you discover a vulnerability or suspected incident affecting your tenant, you must notify Atlas without undue delay at info@atlasipholdingsllc.com.
8.Enforcement & Reporting
- We may apply a progressive ladder: warning → temporary throttling → suspension → termination. Severe abuses (e.g., exploitation, data exfiltration, sanctions evasion) may result in immediate suspension and referral to authorities.
- Report abuse or security issues to info@atlasipholdingsllc.com with relevant logs/headers if available.