Acceptable Use Policy

Last updated Apr 24, 2025

This Acceptable Use Policy ("Policy") constitutes the binding standards governing access to and use of the Platform and Services by any user ("User"), whether such access is direct or through third-party integrations. Terms not defined herein shall have the meanings set forth in Warp's Terms of Service. Warp reserves the right to modify this Policy at its sole discretion by posting updates to the Platform. Continued use following any modification constitutes acceptance of such changes. 1. POLICY VIOLATIONS Warp maintains absolute discretion to suspend or terminate Platform and Services access upon any actual or suspected Policy violation. Such suspension or termination may occur without prior notice and shall be in addition to any other remedies available to Warp under applicable law or equity. 2. PROHIBITED CONDUCT User's access to and use of the Platform and Services shall be strictly limited to activities expressly authorized by Warp. The following activities are expressly prohibited: 2.1. Operational Prohibitions - Distribution of Harmful Content: Using the Platform or Services to post, upload, or distribute any content that: (a) encourages or promotes unlawful conduct; (b) contains hate speech or discriminatory material based on race, ethnicity, gender, religion, sexual orientation, disability, or any other protected characteristic; (c) includes pornographic, obscene, or sexually explicit material; (d) promotes violence or describes graphic violence; (e) constitutes defamation, libel, or slander; (f) reveals confidential or private information without authorization; (g) infringes intellectual property rights; or (h) violates any applicable laws, regulations, or professional standards. - Harmful Business Activities: Engaging in or promoting: (a) sale of illegal goods or services; (b) high-risk financial transactions; (c) activities promoting discrimination, hate, or intolerance; (d) businesses on Warp's restricted industries list; (e) money laundering or terrorist financing; (f) sanctioned activities or jurisdictions; (g) pyramid schemes or fraudulent business models; or (h) any other unlawful commercial activities. - Malicious Technical Activities: Distribution of: (a) malware, viruses, or malicious code; (b) corrupted files or programs; (c) software designed to interrupt service operation; (d) programs that damage or compromise system integrity; (e) scripts that exploit Platform vulnerabilities; (f) code that overloads system resources; or (g) any other technically harmful content. - Unauthorized Marketing: Engaging in: (a) spam or bulk unsolicited messages; (b) unauthorized promotional campaigns; (c) deceptive marketing practices; (d) email bombing or flooding; (e) chain letters or pyramid schemes; (f) misleading advertising; (g) impersonation of other businesses; or (h) any form of unsolicited commercial communication. - Malicious Conduct: Engaging in any conduct that causes or may cause harm to Warp's operations, personnel, or business interests, including but not limited to: (a) harassing, threatening, or intimidating behavior directed at Warp employees, contractors, service providers, or other Users; (b) making discriminatory, bigoted, or hateful statements; (c) engaging in abusive or vulgar communications; (d) issuing threats of violence or legal action; (e) submitting excessive or unfounded complaints; (f) deliberately creating unreasonable burdens on Warp's support infrastructure; (g) attempting to damage Warp's commercial relationships or market reputation; or (h) coordinating with others to disrupt Warp's services. - Data Collection and Privacy: Unauthorized: (a) collection of personal information; (b) storage of sensitive data; (c) tracking of User behavior; (d) use of data mining tools; (e) creation of User profiles; (f) sharing of confidential information; (g) violation of privacy policies; or (h) any other unauthorized data gathering activities. - Fraudulent Activities: Using the Platform or Services in a fraudulent, deceptive, or misleading manner, including but not limited to: (a) submitting altered, fabricated, or falsified documentation of any kind; (b) providing false or misleading information about identity, authority, or business affiliations; (c) concealing or misrepresenting the true nature of transactions or relationships; (d) attempting to process transactions with sanctioned entities or in restricted jurisdictions; (e) creating multiple accounts to circumvent Platform restrictions; (f) manipulating transaction data or financial records; (g) engaging in money laundering or other financial crimes; or (h) facilitating any form of fraudulent or unlawful activity. - Platform Abuse: Engaging in conduct that: (a) disrupts Platform functionality; (b) interferes with other Users' access; (c) manipulates Platform features; (d) exploits technical vulnerabilities; (e) circumvents usage limitations; (f) creates unnecessary support burden; (g) violates Platform policies; or (h) otherwise abuses Platform resources or services. 2.2. Technical Prohibitions - Security Circumvention: Any attempts to: (a) bypass Platform security measures or authentication systems; (b) access restricted or non-public areas; (c) exploit security vulnerabilities; (d) decrypt encrypted communications; (e) circumvent access controls; (f) gain unauthorized administrative access; (g) compromise User accounts; or (h) defeat any technical protection measures. - System Interference: Actions that: (a) disrupt Platform performance or availability; (b) overload servers or networks; (c) interfere with hosting operations; (d) manipulate Platform functionality; (e) inject malicious code; (f) cause service degradation; (g) create technical conflicts; or (h) otherwise impair system operations. - Unauthorized Access Methods: Using: (a) automated tools to access the Platform; (b) scripts for bulk operations; (c) bots or crawlers; (d) vulnerability scanning tools; (e) password cracking programs; (f) packet sniffers; (g) proxy avoidance tools; or (h) any other unauthorized access mechanisms. - Data Extraction: Engaging in: (a) unauthorized scraping of Platform data; (b) bulk data harvesting; (c) automated data collection; (d) systematic downloading; (e) content reproduction without permission; (f) database copying; (g) unauthorized API usage; or (h) any other unauthorized data gathering. - Infrastructure Abuse: Actions causing: (a) excessive server loads; (b) abnormal bandwidth consumption; (c) database strain; (d) network congestion; (e) resource depletion; (f) service disruptions; (g) system timeouts; or (h) other infrastructure stress. - Competitive Analysis: Using the Platform to: (a) conduct competitive research; (b) perform benchmarking; (c) analyze feature sets; (d) monitor performance metrics; (e) reverse engineer functionality; (f) gather business intelligence; (g) copy Platform features; or (h) develop competing products. - Protocol/Header Manipulation: Engaging in: (a) packet header forgery; (b) TCP/IP manipulation; (c) DNS spoofing; (d) routing table modification; (e) network protocol abuse; (f) traffic manipulation; (g) session hijacking; or (h) any other protocol interference. - Testing and Monitoring: Conducting unauthorized: (a) penetration testing; (b) load testing; (c) vulnerability scanning; (d) security assessments; (e) performance monitoring; (f) availability tracking; (g) error testing; or (h) any other unauthorized system analysis. 2.3. Intellectual Property Prohibitions - Trademark and Branding Violations: Including but not limited to: (a) unauthorized use of Warp's name, logos, or trademarks; (b) creation of confusingly similar marks; (c) misuse of Warp's brand identity; (d) unauthorized brand association; (e) dilution of Warp's marks; (f) false endorsement claims; (g) trademark infringement in metadata; or (h) misuse in marketing materials. - Platform Replication: Prohibited activities including: (a) mirroring Platform content or features; (b) copying Platform layout or design; (c) reproducing user interface elements; (d) duplicating Platform functionality; (e) creating unauthorized Platform derivatives; (f) cloning Platform architecture; (g) replicating Platform workflows; or (h) any other form of unauthorized reproduction. - Source Code Protections: Attempts to: (a) reverse engineer Platform code; (b) decompile Platform software; (c) derive source code or algorithms; (d) analyze Platform architecture; (e) reconstruct Platform logic; (f) modify Platform binaries; (g) create derivative works; or (h) otherwise access or manipulate underlying code. - Content Rights: Violations including: (a) unauthorized use of Platform content; (b) reproduction of proprietary materials; (c) distribution of copyrighted content; (d) modification of protected works; (e) removal of copyright notices; (f) circumvention of content protection; (g) unauthorized translations; or (h) creation of unauthorized adaptations. - Third-Party Rights: Activities that: (a) infringe third-party intellectual property; (b) violate publicity rights; (c) breach confidentiality obligations; (d) misappropriate trade secrets; (e) violate license agreements; (f) infringe patents; (g) violate data rights; or (h) otherwise compromise third-party intellectual property interests. - Derivative Works: Creation of: (a) unauthorized modifications of Platform elements; (b) adaptations of Platform features; (c) translations of Platform content; (d) transformation of Platform materials; (e) integration with competing products; (f) unauthorized extensions or plugins; (g) composite works incorporating Platform elements; or (h) any other unauthorized derivatives. - Documentation and APIs: Unauthorized: (a) reproduction of technical documentation; (b) distribution of API specifications; (c) modification of integration guides; (d) copying of support materials; (e) reuse of Platform documentation; (f) sharing of confidential specifications; (g) publication of internal materials; or (h) misuse of technical resources. - Commercial Exploitation: Including: (a) reselling Platform access; (b) commercializing Platform features; (c) monetizing Platform data; (d) licensing Platform elements; (e) sublicensing Platform rights; (f) creating commercial derivatives; (g) exploiting Platform resources; or (h) any other unauthorized commercial use. 3. ENFORCEMENT AUTHORITY Warp shall maintain unilateral authority to investigate potential violations and enforce this Policy. Warp may cooperate with law enforcement regarding illegal activities. While Warp has no obligation to monitor Platform usage, it reserves the right to review, disable, or remove any content or activity in its sole discretion. This Policy is essential to protecting Warp's business operations and User community. Strict compliance is required for continued Platform access. ------------------------------------------------------------------ 4. REPORTING VIOLATIONS AND SAFE-HARBOR DISCLOSURES ------------------------------------------------------------------ 4.1 User Reporting Obligation Users must promptly report any suspected Policy violation, security incident, or unauthorized access to security@joinwarp.com. Failure to notify Warp within seventy-two (72) hours of discovery may be deemed a separate Policy violation. 4.2 Good-Faith Security Research Warp encourages responsible disclosure of security vulnerabilities. Researchers acting in good faith who (a) refrain from exploiting or exfiltrating data and (b) provide a detailed vulnerability report to responsible-disclosure@joinwarp.com will not be deemed in violation of Sections 2.2 or 2.3. 4.3 Safe-Harbor Limitations Safe-harbor does not apply to activities that (a) compromise payroll data, (b) violate any applicable privacy statute, or (c) result in service disruption. Warp retains sole discretion to determine whether safe-harbor applies. ------------------------------------------------------------------ 5. ADDITIONAL COMPLIANCE OBLIGATIONS ------------------------------------------------------------------ 5.1 Payroll & Tax-Data Restrictions Because Warp processes wage, tax, and benefits information subject to U.S. Internal Revenue Code, Bank Secrecy Act, and state unemployment statutes, Users shall: (a) collect only information necessary for lawful payroll processing; (b) refrain from storing wage or tax data on non-Warp systems unless encrypted to NIST FIPS 140-2 standards; (c) comply with all IRS Publication 1345 e-file security standards when transmitting documents to Warp; and (d) not use the Services to file tax documents on behalf of entities located in embargoed nations. 5.2 International Data Transfers Users outside the United States must ensure that their collection of Employee Data is lawful under applicable data-protection frameworks (e.g., GDPR, PIPEDA). By uploading any personal data to the Platform, the User represents that appropriate cross-border transfer mechanisms (SCCs, UK IDTA, or equivalent) have been implemented. 5.3 Industry-Specific Restrictions The Services may not be used by: (a) cannabis businesses lacking federal banking authorization; (b) online gambling operations; (c) adult-content producers; or (d) shell entities formed solely for tax evasion. Warp may request evidentiary documentation (e.g., employer identification number, beneficial-ownership affidavit) to validate compliance. 5.4 Third-Party Integrations Users integrating third-party software with Warp must: (a) use only documented APIs; (b) comply with rate limits; (c) implement OAuth 2.0 or comparable secure authentication; and (d) abide by all prohibitions in Section 2. Warp disclaims liability for data exfiltration arising from non-authorized third-party integrations. ------------------------------------------------------------------ 6. REMEDIAL ACTIONS AND REINSTATEMENT ------------------------------------------------------------------ 6.1 Investigation Process Upon notice of an alleged violation, Warp may immediately suspend access. Warp will provide a written notice (“Suspension Notice”) detailing the alleged violation and required remediation steps. Users must respond within five (5) business days; non-response constitutes admission. 6.2 Reinstatement Conditions Suspended Users may request reinstatement only after: (a) completing an internal audit and certifying remediation in writing; (b) paying any outstanding fees or investigation costs; and (c) implementing controls reasonably requested by Warp (e.g., MFA, IP allow-listing). 6.3 Recidivism A second violation within any rolling twelve-month period constitutes “Material Breach” under Warp’s Terms of Service and may result in permanent termination, data-export fees, and referral to regulatory authorities. ------------------------------------------------------------------ 7. DEFINITIONS ------------------------------------------------------------------ “Confidential Information” means all non-public business, technical, or financial information disclosed in connection with the Services. “Employee Data” means any personally identifiable information relating to a current, former, or prospective employee processed through the Services. “Restricted Industries List” means those industry classifications periodically published by Warp at https://joinwarp.com/restricted-industries (as updated). “Sanctioned Jurisdiction” means any country or region subject to comprehensive U.S. embargo (e.g., Cuba, Iran, North Korea, Syria, Crimea, Donetsk, Luhansk). “Services” has the meaning ascribed in Warp’s Terms of Service and includes all associated APIs, documentation, and support channels. ------------------------------------------------------------------ 8. MODIFICATIONS TO THIS POLICY ------------------------------------------------------------------ Warp may revise this Policy at any time by posting a revised version to the Platform or by providing written notice to the administrative contact on file. Except where required by law, modifications become effective thirty (30) days after posting. Continued use after the effective date constitutes acceptance of the revised Policy. ------------------------------------------------------------------ 9. CONTACT INFORMATION ------------------------------------------------------------------ Questions regarding this Policy should be directed to: legal@joinwarp.com Poaster Technologies Inc d/b/a Warp 169 Madison Ave #2298, New York, NY 10016, USA ------------------------------------------------------------------ END OF SUPPLEMENTAL TERMS ------------------------------------------------------------------