Acceptable Use Policy
Version No 2. Last updated April 15, 2024.
This Use Policy outlines the guidelines for utilizing the services and systems provided by WaveProxy, a product of Devopsflare, accessible through the website https://www.waveproxy.com.
1. General Provisions and Definitions
1.1 WaveProxy is a product of Devopsflare LLC, registered in USA with the address: 30 North Gould Street, Ste R Sheridan, WY 82801 USA
1.2 Any individual utilizing the Company’s services/systems is recognized as a client of the Company (the “Client” / “You”).
1.3 The Company and the Client are contractually bound by the Terms and Conditions (the “Agreement”), governing the relationship between the Company, as a service provider, and the Client, as a service user, or a user of the System prior to/without logging in/creating an Account (Clause 2 of the Agreement).
1.3.1 The Company offers various IP address proxy infrastructure solutions, including IP addresses for Clients to connect to the internet and access to the Company’s data gathering and proxy management solutions (the “Services”). These Services can be accessed and utilized via the website www.waveproxy.com (the “System”).
1.3.2 The most recent version of the Agreement is accessible at https://waveproxy.com/terms-of-service/.
1.4 This Use Policy is binding and will be interpreted in conjunction with the Agreement. The definitions outlined in the Agreement shall apply to this Use Policy.
1.5 For matters concerning this Use Policy, we recommend contacting the Company via email by sending your inquiry to support@waveproxy.com.
1.6 The Company reserves the right to unilaterally modify and/or update the Use Policy at any time without prior notice. Continued use of the Services/System by the Client implies acceptance of the Use Policy in its latest and most updated version. Clients are advised to periodically review and assess the Use Policy.
1.7 The latest version of the Use Policy is available at https://waveproxy.com/privacy/.
1.8 By agreeing to the terms of the Agreement, in accordance with the rules outlined therein, you automatically agree to the Use Policy.
1.9 If you disagree with any aspect of the Use Policy, you must refrain from using the Services, System, or any of its components immediately.
2. Prohibited Activities and Content
2.1 The following is a non-exhaustive list of prohibited activities and content on or through the System and Services.
2.2 Prohibited activities and content are defined as any action/content that is offensive, objectionable, contrary to public interest, morality, order, security, or prohibited by applicable laws, regulations, procedures, orders, or requirements.
2.3 While utilizing the System and Services, you agree not to engage in or assist, encourage, or enable others to engage in the following (the “Prohibited Activities”):
2.3.1 Distribute cracks, warez, ROMs, viruses, adware, worms, trojan horses, malware, spyware, or any other similar malicious software and products, or any other computer code, files, or programs designed to interrupt, hijack, limit, destroy, or negatively affect the functionality of any computer software, hardware, network or telecommunications equipment.
2.3.2 Cause any network resource to be unavailable to its intended users, including, without limitation, via “denial-of-Service (DoS)” or “distributed denial-of-service (DDoS)” attacks.
2.3.3 Cause any damage or service disruption to any third-party computers or service.
2.3.4 Promote, support, or contribute to establishing, publishing, distributing, and developing malicious programs and viruses, hacking and piracy programs, and the sites that provoke, promote, or publish information about how to hack networks, information technology devices, or communications or having access to the same without right or to disrupt them in addition to the sites that provide supporting services for the above.
2.3.5 Engage in or encourage any unlawful activity, including but not limited to:
Provoking, calling for, promoting, or providing information about how to carry out acts of crime or felony or contributing to or facilitate carrying out or supporting the same such as theft, fraud, robbery, forgery, faking, bribery, killing, suicide, blackmail, threat, rape, commercial cheating, and breaching the properties of others, abduction, evasion from application of law, money laundering, smuggling prohibited content, and other crimes punishable by the law.
Supporting or engaging in terrorism in any way, including but not limited to, by creating, publishing, sharing, supporting any content relating to terrorist groups or any illegal group, association, organization, or body or any content that facilitates communication with their leaders or members or to attract members or promote and favor their ideas or assist in financing their activities or contribute to assisting them actually or any content that publishes methods of making fire or explosive devices or any other tools used in terrorist acts.
Inciting, encouraging or enabling the commission of a crime against any country or one of its citizens or employees or its interests or public funds or public facilities abroad, including embassies, consulates, missions, or affiliate offices.
Practices of deception, fraud, theft, and embezzlement.
Illegally compiling, publishing or allowing others to have access to bank statements or accounts, data, credit or electronic card numbers or any electronic payment method and also compiling, publishing or allowing others to have access to names, secret numbers or access codes to websites or information technology means such as email and others.
Impersonating or claiming status of others for fraudulent purposes.
Promoting witchcraft or other similar practices, especially such that might result in violations of human rights, including causing any physical harm.
Insulting, slandering or defamation.
2.3.6 Distribute any unlawful and illicit content.
For the avoidance of doubt, it is noted that illicit content might not be forbidden by law but is considered to be improper or socially forbidden as they go against social norms and values and can be assessed differently in different contexts. Such cases might be:
Pornography and nudity content.
Internet content that promotes or facilitates publishing or exchanging child pornography.
Internet content that motivates, supports, promotes, or publishes opinions that include aggression to public manners or involves corrupting youth or calling for embracing or promoting destructive principles.
Internet content that motivates and supports or promotes practice of vice, adultery, prostitution or illegal and unethical relations and the internet content related to human trafficking crimes or those including prostitution advertisements.
Internet content that promotes or is used for the purpose of trading immoral or forbidden by law goods or services, including, but not limited to:
Counterfeit money.
Hazardous waste.
Endangered species of animals, birds and plants or their members according to international treaties.
Counterfeit and fake goods.
Firearms, ammunition, and explosives.
Illegal drugs. It is strictly prohibited to promote or contribute to trading with drugs and mind affecting substances and the manner of using or manufacturing the same or obtaining drugs or facilitating their circulation in circumstances that are not legally authorized.
The concept of unlawful and illicit content may differ depending on the location that You are using the System/Services from. At all times You are solely responsible for making sure that Your use of the System/Services is in compliance with applicable law, rules and moral requirements.
In all cases any abuse towards minors, any type of hate speech, threat of harm to health or life, manifestations of extremism, spread of disinformation and fake news, especially in socially sensitive topics as health, safety, human rights, etc., as well as incitement to do similar acts are considered as a breach of this prohibition.
2.3.7 Engage in or encourage discrimination, racism, and contempt of religion. Such actions may be:
Promoting, offending, defaming, insulting, ridiculing, or violating any of the religions or any of its rites, sanctities or divine books, or interfering with freedom to practice one’s religion by violence or threat.
Promoting or favoring what would raise sedition, hatred or racism or sectarianism or harming national unity or social peace or disturb the public order or public morals.
Promoting or creating any form of discrimination and provoking hate speech with intent to incite hatred between individuals and groups.
2.3.8 Violate third-party’s intellectual property rights. Any use of the System/Services for downloading or distributing pirated material, as well as any other form of intellectual property rights breach is considered as a breach of this prohibition. Such cases might be:
Providing and publishing movies, photos, drawings, books, electronic programs and games, encrypted TV and radio channels and other intellectual property rights in electronic form without legal right to do so.
Providing information, tools and methods aiming to infringing intellectual property rights and penetrating the protection means used for protecting such rights as decoding movies and coded TV channels and operation of copied magnetic diskettes and copied electronic programs and games and deactivation of protection systems designed exclusively for combating piracy.
2.3.9 Commit, engage or encourage any type of fraud, including but not limited to click fraud and generating fake traffic. An act of illegally clicking on pay-per-click ads or any other links by human, bots or software force to increase site revenue or to exhaust site‘s advertising budget, as well as to achieve any other goal such as to falsely increase a site’s audience in any site that is owned by You or any other person is considered as a breach of this prohibition.
2.3.10 Create dishonest social engagement such as creating and operating fake profiles in social media, creating fake reviews, leaving fake likes or generating shares / comments, conducting romance and other similar scams.
2.3.11 Conduct of privacy invasion, including but not limited to:
Using tools for phone tapping, espionage, theft or publication of private information or tracking, recording or intercepting communications or conversation without right.
Exposing news, photos or comments related to the private or family life even if it is true if publishing the same shall harm the concerned person in publication. In addition, this includes disclosure of a secret that may harm a person’s reputation, wealth or trade name or the publication of something intended to threaten or force them to pay money or provide benefit to others or be deprived of freedom to work.
Exposing medical examinations, medical diagnosis, medical treatment or care or medical records of other persons.
Internet content that allows access to private information illegally including those related to addresses and phone numbers of individuals or which allows disturbing others such as spam messages.
2.3.12 Enhance or operate a service or an entity that competes with the Services or assist any other party to do so.
2.3.13 Resell or in any other way commercially exploit any or/and all of the Services, as well as any or/and all intellectual property rights of the Company.
3. Blocked Websites and Disclosure of Vulnerabilities
3.1 Access to websites and web pages containing prohibited content may be blocked by internet service providers in your location. Furthermore, to ensure Your and the public‘s interests, the Company continuously endeavors to enhance the safety of its System/Services.
3.2 The Company reserves the right to block access to any website while using the System/Services at its sole discretion.
3.3 The Company currently blocks smtp ports and it will be accessible only after verification. If the port's validity is successfully verified and it is determined not to be spam, Clients can access Mail ports by completing ID verification.
3.4 The Company reserves the right to add or remove any website / content blocking at any time at its sole discretion. You should always check the available and up-to-date information regarding the website / content blocking before using the System/Services.
3.5 The Company encourages You to report any violations of the Use Policy, as well as any websites/data the Company should consider blocking. Furthermore, the Company encourages You to report any security or technical issues You may notice/believe exist in the System/Services. You acknowledge and agree that any sharing of information with the Company is voluntary, and that You shall not be entitled to any financial reward.
4. Liability
4.1 Clients are expected to exercise reasonable personal judgment when determining which information, websites, or actions are considered prohibited.
4.2 In addition to the liability clauses set forth in the Agreement, the Client agrees to defend, indemnify, and hold harmless the Company, its affiliates, and each of their respective directors, officers, employees, and agents from and against any and all third-party claims, demands, and liabilities, including reasonable attorney’s fees, resulting from or arising out of Client’s failure to comply with Client’s obligations under any and all laws, rules, or regulations applicable to Client under the Agreement and Use Policy, as well as for any breach or violation of the rules of the Use Policy.
5. Miscellaneous
5.1 Any updates to this Use Policy shall take effect upon publication in the System as indicated in Clause 1. By using the Services, You agree to be bound by any updated version of the Use Policy.
5.2 You are encouraged to contact us via the means specified in the Agreement. Sending an email to support@waveproxy.com shall be considered the primary means of communication.
5.3 The Company shall respond to Your inquiries within 7 days.