Last Updated: Mar 9, 2026

This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“you”, “your”, “yours”, or “Customer”) using any products and services provided by Datum Technology, Inc or any of its affiliates (“Services”) and any user of the Services, including via any products and services provided by Customer (“End User”). Datum Technology, Inc together with its affiliates will be referred to as “Datum” in this AUP. The prohibited conduct in this AUP is not exhaustive. Customer is responsible for its End Users’ compliance with this AUP. If Customer or any End User violates this AUP, Datum may suspend or terminate Customer’s use of the Services. This AUP may be updated by Datum from time to time upon reasonable notice, which may be provided via Customer’s account, e-mail, or by posting an updated version of this AUP at datum.net/legal/aup.

1. No Inappropriate Content or Users

Do not use the Services to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, or objectionable, including, but not limited to, content or communications which Datum determines (a) is false or inaccurate; (b) is hateful or encourages hatred or violence against individuals or groups; (c) could endanger public safety; (d) is pornographic, sexually explicit, or age-inappropriate; or (e) glorifies or incites violence. This prohibition includes use of the Services by a hate group or by individuals under 13 years of age (or the minimum age required by applicable law). Customer and its End Users are also prohibited from using the Services to promote, or enable the transmission of or access to, any prohibited content or communications described in this section.

2. Prohibited Activities

Do not use the Services to engage in or encourage any activity that is illegal, deceptive, harmful, a violation of others’ rights, or harmful to Datum’s business operations or reputation, including:

Violations of Laws or Standards. Violating laws, regulations, governmental orders, industry standards, or telecommunications providers’ requirements or guidance in any applicable jurisdiction, including any of the foregoing that require (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications.

Interference with the Services. Interfering with or otherwise negatively impacting any aspect of the Services or any third-party networks that are linked to the Services.

Reverse Engineering. Reverse engineering, copying, disassembling, or decompiling the Services.

Falsification of Identity or Origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.

Fraudulent Activities. Engaging in deception, fraud, misrepresentation, or impersonation in any form, including Ponzi schemes, pyramid schemes, or other fraudulent financial activities.

Spam and Unsolicited Communications. Sending bulk email, spam, or unsolicited marketing communications.

3. Intellectual Property

Do not use the Services to infringe upon copyrights, trademarks, patents, or other intellectual property rights, including by distributing pirated software, media, or other unauthorized content, violating licensing agreements or terms of use for third-party content, or engaging in unauthorized scraping or harvesting of copyrighted material.

4. Financial and Cryptocurrency Restrictions

Do not use the Services for money laundering or other financial crimes, fraud or embezzlement, unauthorized cryptocurrency mining or trading, or transactions involving illegal goods or services.

5. No Service Integrity Violations

Do not violate the integrity of the Services, including:

Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Services.

Security Vulnerabilities. Finding security vulnerabilities to exploit the Services or attempting to bypass any security mechanism or filtering capabilities.

Disabling the Services. Any denial of service (DoS) attack on the Services or any other conduct that attempts to disrupt, disable, or overload the Services.

Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Services.

Unauthorized Access. Attempting to gain unauthorized access to the Services.

6. Network and Interconnection Integrity

Do not misuse Datum’s network infrastructure or interconnection resources, including:

Traffic Manipulation. Artificially manipulating traffic volumes, routing paths, or peering relationships in a manner inconsistent with normal network operations or intended to circumvent usage-based limitations or fees.

Routing Abuse. Announcing, originating, or propagating IP prefixes or routing information (including BGP announcements) that Customer is not authorized to announce, or that are intended to redirect, intercept, or disrupt traffic flows.

Unauthorized Interconnection. Attempting to establish or exploit peering, transit, or interconnection relationships with Datum’s network or its upstream and downstream partners without explicit authorization.

Resource Exhaustion. Consuming network resources, including bandwidth, ports, or interconnection capacity, in a manner that disproportionately impacts other customers or degrades the shared infrastructure.

7. Data Safeguards

Customer is responsible for determining whether the Services offer appropriate safeguards for Customer’s use of the Services, including, but not limited to, any safeguards required by applicable law or regulation, prior to transmitting or processing, or prior to permitting End Users to transmit or process, any data or communications via the Services. Customer must comply with all applicable privacy laws and regulations, including obtaining proper consent before collecting, processing, or transmitting personal data, and honoring opt-out requests and data subject rights.

8. Appeals Process

If Customer believes an enforcement action was taken in error, Customer may submit an appeal to abuse@datum.net within 30 days of the action. The appeal must include a detailed explanation of why the action was inappropriate, supporting documentation or evidence, and proposed remediation steps. Datum will review appeals in good faith but reserves final discretion on all enforcement decisions.

9. Service and Country Specific Requirements

Additional requirements for specific (a) Services, including any country specific requirements, and (b) products and services that are purchased from Datum, but provided, or otherwise made available, by a third party are, in either case, set forth at https://www.datum.net/legal/service-country-specific-terms and apply solely to the extent Customer uses those specific (i) Services or (ii) third-party products and services.

10. Reporting Violations

Violations of this AUP, including any prohibited content or communications, may be reported to notice@datum.net. Reports should include a description of the violation, relevant evidence or documentation, and contact information for follow-up. Customer agrees to immediately report any violation of this AUP to Datum and provide cooperation, as requested by Datum, to investigate and/or remedy that violation.