Acceptable Use Policy
Last updated: March 2026
Effective date: March 2026
Version: 1.0
This Acceptable Use Policy ("AUP") governs your use of Intelsieve, LLC's ("Intelsieve", "we", "our", or "us") platform, APIs, and related services (collectively, the "Services"). This AUP is incorporated by reference into our Terms of Service. Capitalized terms not defined here have the meanings given in the Terms of Service.
1. Purpose
Intelsieve provides threat intelligence services designed to help organizations protect themselves against cybersecurity threats. Our Services are intended exclusively for lawful, defensive security purposes, including but not limited to:
- Monitoring your organization's attack surface for vulnerabilities
- Detecting credential exposures and data breaches affecting your organization
- Tracking threat actors and ransomware groups targeting your industry
- Correlating threat intelligence to improve your organization's security posture
- Integrating threat data into your Security Operations Center (SOC) workflows
2. Authorization Requirement
2.1 Your Responsibility
By using our Services, you represent and warrant that you are authorized to conduct all searches, monitoring activities, and intelligence-gathering operations you perform through our platform. This means:
- You have the legal right to monitor the domains, IP addresses, email addresses, and other assets you configure in our platform
- If you are monitoring assets on behalf of a third party (e.g., a client or partner), you have obtained proper written authorization from that third party
- You have reviewed and comply with all applicable laws governing the type of monitoring and intelligence-gathering activities you perform
2.2 Intelsieve's Role
Intelsieve is a platform provider and data aggregator. We provide tools and data; you are responsible for how you use them. We do not verify the authorization of individual searches or monitoring configurations. By accepting this AUP, you acknowledge that:
- Intelsieve does not act as your agent and does not conduct searches on your behalf
- You initiate and control all monitoring and search activities through your account
- You bear full responsibility for ensuring the legality and propriety of your use
3. Permitted Uses
You may use our Services for the following purposes:
- Defensive cybersecurity: Monitoring your own organization's digital assets for threats, vulnerabilities, and exposures
- Managed security services: Providing threat intelligence services to your clients, provided you have written authorization from each client
- Incident response: Investigating security incidents affecting your organization or authorized clients
- Threat research: Conducting legitimate security research to understand threat landscapes and actor behaviors
- Compliance monitoring: Using threat intelligence to meet regulatory and compliance requirements
- Risk assessment: Evaluating cybersecurity risks for business decisions, mergers, acquisitions, or partnerships (with proper authorization)
- Law enforcement: Lawful use by government and law enforcement agencies within the scope of their legal authority
4. Prohibited Uses
You may NOT use our Services for any of the following purposes. Violation of these restrictions may result in immediate suspension or termination of your account without refund.
4.1 Illegal Activities
- Conducting any activity that violates applicable local, state, national, or international law
- Violating the Computer Fraud and Abuse Act (CFAA), the UK Computer Misuse Act, or equivalent laws in any jurisdiction
- Unauthorized access to computer systems, networks, or data
- Engaging in, facilitating, or planning any form of cybercrime
4.2 Harassment and Harm
- Using data obtained from our Services to harass, stalk, intimidate, or threaten any individual
- Doxing or publishing private information about individuals with the intent to cause harm
- Conducting unauthorized surveillance of individuals
- Using our Services to discriminate against individuals based on protected characteristics
- Facilitating domestic abuse, intimate partner surveillance, or any form of interpersonal violence
4.3 Unauthorized Monitoring
- Monitoring domains, IP addresses, email addresses, or other assets that you do not own and are not authorized to monitor
- Conducting competitive intelligence gathering that violates applicable trade secret or unfair competition laws
- Using our Services to monitor employees without proper legal authorization and notice as required by applicable law
- Intercepting or monitoring communications without proper authorization
4.4 Data Misuse
- Reselling, sublicensing, or redistributing raw threat intelligence data from our platform without a separate written agreement from Intelsieve
- Building competing products or services using data obtained from our Services
- Using our data to create databases of personal information for marketing, advertising, or profiling purposes
- Sharing your account credentials or API keys with unauthorized parties
- Circumventing rate limits, access controls, or data export restrictions
4.5 Platform Abuse
- Attempting to gain unauthorized access to our systems, infrastructure, or other users' accounts or data
- Interfering with or disrupting the performance, availability, or integrity of our Services
- Uploading or transmitting malware, viruses, or other malicious code through our APIs or platform
- Reverse engineering, decompiling, or disassembling our software
- Using automated tools (other than our published APIs) to scrape or harvest data from our platform
- Attempting to circumvent security measures, authentication mechanisms, or access controls
- Testing our platform's security without prior written authorization from Intelsieve
4.6 Export Control Violations
- Using our Services in violation of U.S. export control laws, including the Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR)
- Providing access to our Services to individuals or entities subject to U.S. sanctions
- Using our Services from or in countries subject to comprehensive U.S. trade embargoes
5. Monitoring and Enforcement
5.1 Our Rights
We reserve the right (but are not obligated) to:
- Monitor usage of our Services to detect violations of this AUP
- Investigate suspected violations of this AUP
- Remove or disable access to any content or data that violates this AUP
- Suspend or terminate accounts that violate this AUP, with or without prior notice
- Report illegal activities to appropriate law enforcement authorities
- Cooperate with law enforcement investigations as required by law
5.2 Reporting Violations
If you become aware of any violation of this AUP, please report it to:
Email: abuse@intelsieve.com
We take all reports seriously and will investigate promptly.
5.3 Consequences of Violation
Violations of this AUP may result in:
- Warning: For minor or first-time violations, we may issue a written warning
- Suspension: Temporary suspension of your account while we investigate
- Termination: Permanent termination of your account without refund
- Legal action: We reserve the right to pursue legal remedies for violations that cause harm to Intelsieve or third parties
6. Cooperation with Law Enforcement
Intelsieve will cooperate with law enforcement authorities when required by law, including in response to valid subpoenas, court orders, and other compulsory legal processes. We may also voluntarily report to law enforcement when we have a reasonable, good-faith belief that use of our Services involves imminent danger of death or serious physical injury, exploitation of minors, or other serious criminal activity.
7. Repeat Violations
Users who repeatedly violate this AUP may have their accounts terminated after appropriate warnings. We reserve the right to suspend or terminate any account that engages in a pattern of prohibited activity.
8. Disclaimer
YOU ACKNOWLEDGE AND AGREE THAT INTELSIEVE IS A PLATFORM PROVIDER AND DATA AGGREGATOR. WE DO NOT CONTROL HOW YOU USE THE DATA AND TOOLS PROVIDED THROUGH OUR SERVICES. YOU ARE SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE OF OUR SERVICES COMPLIES WITH ALL APPLICABLE LAWS AND THIS AUP. INTELSIEVE SHALL NOT BE LIABLE FOR YOUR MISUSE OF DATA OR TOOLS PROVIDED THROUGH OUR SERVICES.
9. Changes to This Policy
We may update this AUP from time to time. We will notify you of material changes by email and/or in-platform notification at least 30 days before the changes take effect. Continued use of our Services after the effective date constitutes acceptance of the updated AUP.
10. Contact Us
If you have questions about this Acceptable Use Policy:
- Abuse reports: abuse@intelsieve.com
- Legal inquiries: legal@intelsieve.com
- General support: support@intelsieve.com