Back to Home
Public PolicyLEGAL-AUP-PUBLICLast Updated April 10, 2026

Operational Use Controls

Acceptable Use Policy

This Acceptable Use Policy defines the conduct boundaries for public-site interaction, restricted workspaces, automation, uploads, recruiting flows, customer records, and commercial workflows. It is written to protect platform integrity, preserve data boundaries, and make enforcement expectations explicit for authorized users and external parties alike.

Protected environments

Public pages, restricted routes, APIs, uploads, customer workspaces, and recruiting workflows

Core prohibitions

Unauthorized access, credential misuse, scraping, record manipulation, malware, and payment abuse

Report channel

abuse@spaltx.com

Enforcement tools

Logging, throttling, content restriction, suspension, termination, and legal escalation

01

Scope and Protected Environments

Defines the technical and operational environments covered by this policy.

Anchor

This Acceptable Use Policy applies to all use of the public websites, dashboards, customer workspaces, admin workspaces, APIs, uploads, restricted areas, recruiting workflows, quote and invoice flows, and other current or future SpaltX-branded services made available by Optiarms, Inc. d/b/a SpaltX Industries.

This policy supplements the Terms of Service and any applicable signed agreement. Use of any Service in violation of this policy is prohibited, whether the activity occurs through a public page, authenticated account, internal workflow, recruiting flow, workspace, API request, script, or other automated means.

02

Authorization Boundaries and Workspace Access

Restricts users to the routes, records, and environments explicitly assigned to them.

Anchor

You may use only the features, routes, records, data, and environments expressly assigned to you or your organization.

  • Do not access, browse, enumerate, or attempt to enter admin panels, internal tools, dashboards, candidate records, organization workspaces, commercial records, or APIs that are not assigned to you.
  • Do not attempt privilege escalation, session theft, impersonation, or use of another person's credentials, account, or organization context.
  • Do not bypass or evade MFA, password controls, rate limits, approval workflows, audit logging, robots directives, or any other technical or administrative restriction.
03

Credential, Identity, and Access Abuse

Prohibits account sharing, false identity, and access abuse across both public and restricted services.

Anchor

Account access is personal to the authorized user or managed by the organization that issued the account. You may not misrepresent who you are or who you represent while using the Services.

  • Do not share passwords, backup codes, magic links, session tokens, or MFA credentials with unauthorized users.
  • Do not register accounts with false identity details, misleading company information, or disposable contact information intended to evade review.
  • Do not use the Services to compromise, degrade, or test our systems or anyone else's systems without explicit written authorization.
04

Security Testing, Malware, and System Interference

Prohibits unauthorized testing, interception, destructive payloads, and reliability attacks.

Anchor
  • No scanning, probing, vulnerability testing, penetration testing, traffic interception, or similar activity without prior written authorization.
  • No malware, ransomware, spyware, credential harvesting, phishing, denial-of-service activity, destructive payloads, or unauthorized data exfiltration.
  • No reverse engineering, source-code extraction, model extraction, or attempts to defeat security, integrity, or monitoring controls except as expressly permitted by law.

Any activity that threatens confidentiality, integrity, availability, or auditability of the Services may be treated as a material policy violation even if it does not result in successful access or data exposure.

05

Uploads, Documents, and Communications

Requires content submitted through the platform to be lawful, accurate, and fit for the intended workflow.

Anchor

Any file, message, form response, resume, cover letter, project attachment, invoice note, or other content you submit must be lawful, accurate, and appropriate for the intended workflow.

  • Do not upload malicious files, executable attacks, deceptive documents, illegal content, infringing material, or content that violates confidentiality, privacy, or publicity rights.
  • Do not use uploads, forms, or communication channels to transmit spam, scams, harassment, hateful content, or threats.
  • Do not use upload flows to store unrelated files, stage data for redistribution, or circumvent restrictions on file type, volume, retention, or purpose.
06

Recruiting, Intake, and Record-Integrity Abuse

Protects recruiting, intake, and operational records from false submissions and manipulation.

Anchor

Recruiting, contact, quote, and signup workflows are intended for legitimate candidate, customer, and business operations only.

  • Do not submit false, misleading, stolen, or fabricated applicant information, credentials, portfolios, resumes, work history, or customer details.
  • Do not apply on behalf of another person without authority or use automated means to flood, scrape, or disrupt recruiting or intake processes.
  • Do not alter, hide, falsify, backdate, or otherwise manipulate project, billing, operational, or audit records in a misleading or deceptive way.
07

Data Extraction, Automation, Scraping, and Model Misuse

Restricts automated collection, competing-dataset assembly, and misuse of restricted content.

Anchor

Bots, scripts, agents, or automated systems may be used only to the extent we explicitly allow them, and only within the permissions, rate limits, and scopes we provide.

  • Do not scrape protected content, restricted pages, candidate records, uploads, invoices, or workspace data.
  • Do not use the Services to build a competing product, benchmark hidden systems, create unauthorized training datasets, or replicate the behavior or structure of restricted features.
  • Do not generate excessive load, bypass caching or rate limits, or automate workflows in a way that impairs reliability or degrades the experience of other users.
  • Do not connect unapproved integrations, relay data through shadow tooling, or trigger automated actions outside the permissions or scopes we provide.
08

Billing, Payment, and Commercial Workflow Abuse

Protects quote, invoice, payment, and recordkeeping workflows from manipulation or fraud.

Anchor
  • Do not interfere with invoice delivery, payment collection, quote approval, notification flows, or recordkeeping steps used to support customer operations.
  • Do not submit fraudulent payment information, attempt charge abuse, manipulate hosted payment links, or impersonate a payer, vendor, or customer contact.
  • Do not access, export, disclose, resell, or repurpose customer, applicant, or workspace data except as expressly authorized for the relevant workflow.
09

Monitoring, Enforcement, and Reporting

Makes the available enforcement actions and escalation paths explicit.

Anchor

We may monitor use of the Services, review uploads and logs, apply rate limits, disable content, suspend or terminate access, preserve evidence, and cooperate with legal process or investigations when we reasonably believe it is necessary to protect users, systems, rights, or legal compliance.

Observed conditionTypical response
Low-severity misuse or workflow deviationWarning, content removal, temporary rate control, or corrective instruction.
Credential abuse, unauthorized access attempts, or record-integrity issuesImmediate restriction, session invalidation, account suspension, evidence preservation, and internal investigation.
Malware, scraping of restricted data, payment fraud, or repeated abuseTermination, legal escalation, referral to relevant authorities, and any contractual remedies we deem appropriate.

Report suspected abuse, harmful uploads, credential misuse, restricted-area access attempts, privacy concerns, or security issues to abuse@spaltx.com. Privacy concerns may also be sent to privacy@spaltx.com, and legal notices may be sent to legal@spaltx.com.

10

Policy Updates

Explains how revisions to the acceptable-use baseline are made effective.

Anchor

We may update this Acceptable Use Policy from time to time by posting a revised version on this page. Continued use of the Services after an update becomes effective constitutes acceptance of the revised policy.

Formal notice routing

Optiarms, Inc. d/b/a SpaltX Industries

6545 Market Ave N Ste 100 Canton, OH 44721
Abuse and security: abuse@spaltx.com