Acceptable Use Policy
Rules for responsible use of Excelin websites, portals, systems, previews, integrations, and hosted services.
This page is intended as a clear public statement for website visitors and clients. It should be read together with any signed agreement, proposal, statement of work, or policy schedule that applies to a specific engagement.
1. Purpose
This Acceptable Use Policy protects Excelin Web Limited, our clients, users, infrastructure, providers, and the wider internet community. It applies when you access our website, use a portal or preview environment, receive support, connect to an API, submit content, or use any system we provide or manage.
A separate client agreement may include additional rules. If stricter rules are included in a signed agreement, security schedule, provider policy, or law, those stricter rules will apply for the relevant service.
2. Lawful And Respectful Use
You must use our websites and services only for lawful, authorised, and responsible purposes. You must not submit, store, transmit, display, or process material that is unlawful, deceptive, defamatory, threatening, abusive, discriminatory, harassing, invasive of privacy, or otherwise harmful.
You must not use our services to infringe intellectual property rights, violate contractual obligations, misrepresent identity, impersonate another person, collect information without authority, or interfere with another person's rights.
3. Security Restrictions
You must not attempt to gain unauthorised access to accounts, systems, networks, source code, data, administrative areas, or provider infrastructure. You must not probe, scan, test, exploit, bypass, or weaken security controls unless we have given written permission for a defined security test.
You must not introduce malware, credential harvesters, ransomware, destructive code, automated attack traffic, denial-of-service activity, or tools intended to compromise systems. Good-faith vulnerability reports should follow our Security Statement and avoid accessing data that is not yours.
4. Messaging, Spam, And Automation
You must not use our systems to send unsolicited commercial electronic messages, spam, deceptive messages, phishing attempts, or messages that do not comply with applicable consent, sender identification, and unsubscribe requirements.
Automation must be used responsibly. You must not overload systems, scrape content at unreasonable scale, bypass rate limits, create fake accounts, manipulate analytics, or use bots in a way that harms service availability or data integrity.
5. Data And Privacy
You must not upload, disclose, or process personal information unless you have the right to do so and the information is appropriate for the relevant service. Clients are responsible for ensuring that data they provide to us has been collected and shared lawfully.
You must not use our services to expose sensitive personal information, payment details, credentials, regulated data, or confidential material to people who are not authorised to receive it. If you discover data that appears to be exposed incorrectly, notify us promptly and do not copy, use, or disclose it further.
6. AI And Generated Content
If a service includes AI-assisted features, you must use them lawfully and responsibly. You must not use AI features to generate harmful instructions, impersonation, illegal content, deceptive communications, credential theft, malware, privacy-invasive profiling, or content that violates another person's rights.
AI outputs may be incomplete or inaccurate and should be reviewed by a qualified person before being used for important business, legal, financial, security, health, employment, or compliance decisions.
7. Enforcement
If we reasonably believe this policy has been breached, we may investigate, remove content, restrict access, suspend accounts, preserve evidence, notify affected clients or providers, or report serious issues to appropriate authorities. We will try to act proportionately, but urgent security or legal risk may require immediate action.
You are responsible for the actions of people who use your account, credentials, portal, API keys, or systems under your control. Notify us quickly if access should be revoked or credentials may have been compromised.
8. Contact
Questions about acceptable use, suspected abuse, security concerns, or misuse reports can be sent to support@excelinweb.com. Include relevant URLs, timestamps, account details, screenshots, headers, or logs where appropriate.
We may update this policy as our services, laws, providers, or risk controls change. The version posted on this website applies to future use from the updated date shown above.
9. Client Content And Provider Rules
Clients remain responsible for the content, data, instructions, campaigns, users, integrations, and provider accounts they ask us to configure or operate. If a client uses a third-party platform through a system we build, the client must also follow that provider's acceptable use rules, developer policies, payment rules, messaging rules, storage policies, and data protection requirements.
We may refuse to build, host, connect, or support workflows that appear designed for deception, unauthorised surveillance, spam, credential theft, unlawful scraping, misuse of personal information, circumvention of platform rules, or harm to another person or organisation. This protects our clients, our infrastructure, and the long-term reliability of the systems we maintain.
Reference Points
These public resources informed the structure of this page. They are not incorporated as contract terms unless a written agreement says so.