Acceptable Use Policy

Last updated: November 21, 2025

Table of Contents

  1. Introduction
  2. Purpose
  3. General Obligations
  4. Prohibited Conduct
  5. Enforcement
  6. Reporting Abuse

1. Introduction

This Acceptable Use Policy ("AUP") applies to all Customers, Authorized Users, and any third parties using or accessing KorGrid, LLC's Services, as defined in our Terms of Service (“Terms”). By using our Services, Customer agrees to comply with this AUP. Failure to comply may result in suspension or termination of your account or Services. Undefined capitalized terms herein have the same meaning as in our Terms.

2. Purpose

This AUP outlines acceptable and prohibited behaviors in connection with the use of the Services. The intent is to maintain a secure, reliable, and lawful computing environment for all users.

3. General Obligations

This AUP supplements the Limitations of Liability section of our Terms. The Customer, its Authorized Users, affiliates, sub-processors, employees, and agents must use the Services only for lawful purposes and in a manner consistent with this Agreement, the Terms, and the DPA. The Customer is responsible for the actions of its users, employees, contractors, or third parties operating under its account. KorGrid is not responsible for any losses or damages resulting from your violation of this AUP or the actions taken to enforce it.

4. Prohibited Conduct

You may not use the Services, directly, or indirectly, to engage in any of the following activities:
  • Engaging in or facilitating any illegal activity.
  • Hosting, transmitting, or distributing content that is fraudulent, defamatory, obscene, or violates intellectual property or privacy rights.
  • Deploying or distributing malware, ransomware, or other harmful code.
  • Conducting or participating in denial-of-service attacks, network scanning, or unauthorized intrusion attempts.
  • Sending unsolicited or deceptive communications ("spam").
  • Using the Services for cryptocurrency mining without prior written consent.
  • Interfering with, or degrading, the performance of the Company's systems or the use of the Services by others.
  • Attempting to gain unauthorized access to any account, system, or data not belonging to the Customer.
  • Infringing on intellectual property or privacy rights of others.
  • Disrupting, hindering, or overloading our systems, including any activity that interferes with the security, integrity, or availability of the Services, network, or systems.

5. Enforcement

Violations of this policy may result in suspension or termination of access to the Services without notice. The Company reserves the right to investigate suspected violations and to cooperate with law enforcement agencies or regulators as required by law. You will remain responsible for all charges and expenses incurred for the Services prior to termination, unless otherwise required by law.

6. Reporting Abuse

Incidents or suspected abuse must be reported to [email protected]. Reports should include relevant details such as timestamps, source IP addresses, and a description of the activity in question.