Operational Use Controls
Acceptable Use Policy
This Acceptable Use Policy defines the conduct boundaries for public-site interaction, restricted workspaces, automation, uploads, recruiting flows, customer records, and commercial workflows. It is written to protect platform integrity, preserve data boundaries, and make enforcement expectations explicit for authorized users and external parties alike.
Protected environments
Public pages, restricted routes, APIs, uploads, customer workspaces, and recruiting workflows
Core prohibitions
Unauthorized access, credential misuse, scraping, record manipulation, malware, and payment abuse
Report channel
abuse@spaltx.com
Enforcement tools
Logging, throttling, content restriction, suspension, termination, and legal escalation
Abuse reports
abuse@spaltx.com
Harmful uploads, credential misuse, scraping, or restricted-area access attempts
Privacy concerns
privacy@spaltx.com
Data-handling concerns raised in connection with misuse or unauthorized access
Formal legal notices
legal@spaltx.com
Formal legal correspondence tied to policy enforcement
Mailing address
6545 Market Ave N Ste 100, Canton, OH 44721
Physical notice address for escalated policy correspondence
Jump To Section
Scope and Protected Environments
Defines the technical and operational environments covered by this policy.
This Acceptable Use Policy applies to all use of the public websites, dashboards, customer workspaces, admin workspaces, APIs, uploads, restricted areas, recruiting workflows, quote and invoice flows, and other current or future SpaltX-branded services made available by Optiarms, Inc. d/b/a SpaltX Industries.
This policy supplements the Terms of Service and any applicable signed agreement. Use of any Service in violation of this policy is prohibited, whether the activity occurs through a public page, authenticated account, internal workflow, recruiting flow, workspace, API request, script, or other automated means.
Credential, Identity, and Access Abuse
Prohibits account sharing, false identity, and access abuse across both public and restricted services.
Account access is personal to the authorized user or managed by the organization that issued the account. You may not misrepresent who you are or who you represent while using the Services.
- Do not share passwords, backup codes, magic links, session tokens, or MFA credentials with unauthorized users.
- Do not register accounts with false identity details, misleading company information, or disposable contact information intended to evade review.
- Do not use the Services to compromise, degrade, or test our systems or anyone else's systems without explicit written authorization.
Security Testing, Malware, and System Interference
Prohibits unauthorized testing, interception, destructive payloads, and reliability attacks.
- No scanning, probing, vulnerability testing, penetration testing, traffic interception, or similar activity without prior written authorization.
- No malware, ransomware, spyware, credential harvesting, phishing, denial-of-service activity, destructive payloads, or unauthorized data exfiltration.
- No reverse engineering, source-code extraction, model extraction, or attempts to defeat security, integrity, or monitoring controls except as expressly permitted by law.
Any activity that threatens confidentiality, integrity, availability, or auditability of the Services may be treated as a material policy violation even if it does not result in successful access or data exposure.
Uploads, Documents, and Communications
Requires content submitted through the platform to be lawful, accurate, and fit for the intended workflow.
Any file, message, form response, resume, cover letter, project attachment, invoice note, or other content you submit must be lawful, accurate, and appropriate for the intended workflow.
- Do not upload malicious files, executable attacks, deceptive documents, illegal content, infringing material, or content that violates confidentiality, privacy, or publicity rights.
- Do not use uploads, forms, or communication channels to transmit spam, scams, harassment, hateful content, or threats.
- Do not use upload flows to store unrelated files, stage data for redistribution, or circumvent restrictions on file type, volume, retention, or purpose.
Recruiting, Intake, and Record-Integrity Abuse
Protects recruiting, intake, and operational records from false submissions and manipulation.
Recruiting, contact, quote, and signup workflows are intended for legitimate candidate, customer, and business operations only.
- Do not submit false, misleading, stolen, or fabricated applicant information, credentials, portfolios, resumes, work history, or customer details.
- Do not apply on behalf of another person without authority or use automated means to flood, scrape, or disrupt recruiting or intake processes.
- Do not alter, hide, falsify, backdate, or otherwise manipulate project, billing, operational, or audit records in a misleading or deceptive way.
Data Extraction, Automation, Scraping, and Model Misuse
Restricts automated collection, competing-dataset assembly, and misuse of restricted content.
Bots, scripts, agents, or automated systems may be used only to the extent we explicitly allow them, and only within the permissions, rate limits, and scopes we provide.
- Do not scrape protected content, restricted pages, candidate records, uploads, invoices, or workspace data.
- Do not use the Services to build a competing product, benchmark hidden systems, create unauthorized training datasets, or replicate the behavior or structure of restricted features.
- Do not generate excessive load, bypass caching or rate limits, or automate workflows in a way that impairs reliability or degrades the experience of other users.
- Do not connect unapproved integrations, relay data through shadow tooling, or trigger automated actions outside the permissions or scopes we provide.
Billing, Payment, and Commercial Workflow Abuse
Protects quote, invoice, payment, and recordkeeping workflows from manipulation or fraud.
- Do not interfere with invoice delivery, payment collection, quote approval, notification flows, or recordkeeping steps used to support customer operations.
- Do not submit fraudulent payment information, attempt charge abuse, manipulate hosted payment links, or impersonate a payer, vendor, or customer contact.
- Do not access, export, disclose, resell, or repurpose customer, applicant, or workspace data except as expressly authorized for the relevant workflow.
Monitoring, Enforcement, and Reporting
Makes the available enforcement actions and escalation paths explicit.
We may monitor use of the Services, review uploads and logs, apply rate limits, disable content, suspend or terminate access, preserve evidence, and cooperate with legal process or investigations when we reasonably believe it is necessary to protect users, systems, rights, or legal compliance.
| Observed condition | Typical response |
|---|---|
| Low-severity misuse or workflow deviation | Warning, content removal, temporary rate control, or corrective instruction. |
| Credential abuse, unauthorized access attempts, or record-integrity issues | Immediate restriction, session invalidation, account suspension, evidence preservation, and internal investigation. |
| Malware, scraping of restricted data, payment fraud, or repeated abuse | Termination, legal escalation, referral to relevant authorities, and any contractual remedies we deem appropriate. |
Report suspected abuse, harmful uploads, credential misuse, restricted-area access attempts, privacy concerns, or security issues to abuse@spaltx.com. Privacy concerns may also be sent to privacy@spaltx.com, and legal notices may be sent to legal@spaltx.com.
Policy Updates
Explains how revisions to the acceptable-use baseline are made effective.
We may update this Acceptable Use Policy from time to time by posting a revised version on this page. Continued use of the Services after an update becomes effective constitutes acceptance of the revised policy.
Formal notice routing
Optiarms, Inc. d/b/a SpaltX Industries
6545 Market Ave N Ste 100 Canton, OH 44721Related Policies

