Acceptable Use Policy

Effective Date: February 13, 2026

This Acceptable Use Policy ("AUP") defines prohibited uses of ExecClone LLC's services. By accessing or using ExecClone services, you agree to comply with this AUP.

Violations of this AUP may result in immediate suspension or termination of your account, with or without notice, and may subject you to legal liability.

Entity: ExecClone LLC
Governing Law: State of Missouri
Contact: jnewberry@execclone.com

1. Purpose

ExecClone is designed to provide strategic command intelligence and workflow automation for legitimate business purposes. This AUP ensures that our services are used lawfully, ethically, and responsibly.

⚠️ ExecClone LLC reserves the unilateral right to suspend or terminate accounts for violations of this AUP, with or without notice, and without liability.

2. Prohibited Activities

You may not use ExecClone services to engage in, facilitate, or promote any of the following activities:

2.1 Fraudulent or Deceptive Communications

  • Sending fraudulent, misleading, or deceptive messages
  • Misrepresenting your identity, affiliation, or the origin of communications
  • Phishing, spoofing, or social engineering attacks
  • Impersonating another person, organization, or entity
  • False or misleading subject lines or content

2.2 Spam and Unlawful Bulk Email

  • Sending unsolicited bulk email (spam)
  • Violating the CAN-SPAM Act, GDPR, CCPA, or other anti-spam laws
  • Sending emails without lawful basis (consent, legitimate interest, or legal obligation)
  • Failing to honor unsubscribe requests
  • Purchasing or using email lists without proper consent
  • Sending emails to addresses obtained through scraping or harvesting

2.3 Harassment and Abuse

  • Harassing, threatening, or intimidating individuals
  • Sending abusive, defamatory, or obscene content
  • Stalking or repeatedly contacting individuals who have requested no contact
  • Discriminatory communications based on race, religion, gender, sexual orientation, disability, or other protected characteristics

2.4 Malware and Security Threats

  • Transmitting viruses, malware, ransomware, or other harmful code
  • Distributing trojans, worms, spyware, or keyloggers
  • Exploiting security vulnerabilities in ExecClone or third-party systems
  • Attempting to gain unauthorized access to accounts, systems, or networks
  • Launching denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks

2.5 Data Scraping and Harvesting Violations

  • Scraping or harvesting email addresses or data without authorization
  • Using automated tools to extract data from third-party websites or services in violation of their terms
  • Violating robots.txt files or anti-scraping measures
  • Accessing or collecting data from ExecClone systems through unauthorized means

2.6 Impersonation and Identity Theft

  • Impersonating ExecClone, its employees, or representatives
  • Impersonating another user, organization, or brand
  • Using false or misleading "From" addresses or sender identities
  • Creating accounts with false or fraudulent information

2.7 Violations of Anti-Spam Laws

  • CAN-SPAM Act (U.S.): Failing to include unsubscribe mechanisms, using deceptive subject lines, or ignoring opt-out requests
  • GDPR (Europe): Processing personal data without lawful basis, failing to honor data subject rights, or lacking proper consent
  • CCPA (California): Violating consumer privacy rights or failing to honor opt-out requests
  • CASL (Canada): Sending commercial electronic messages without express or implied consent
  • Any other applicable anti-spam, privacy, or data protection laws

2.8 Illegal Content and Activities

  • Promoting or facilitating illegal activities
  • Distributing child sexual abuse material (CSAM) or exploitative content
  • Trafficking in drugs, weapons, counterfeit goods, or stolen property
  • Facilitating money laundering, fraud, or financial crimes
  • Violating intellectual property rights (copyright, trademark, patent infringement)
  • Violating export controls or sanctions

2.9 Service Abuse and Interference

  • Attempting to reverse engineer, decompile, or disassemble ExecClone software
  • Circumventing security, access controls, or usage limits
  • Using automated scripts, bots, or tools to abuse or overload ExecClone systems
  • Interfering with the operation, integrity, or performance of ExecClone services
  • Reselling or redistributing ExecClone services without authorization

2.10 Prohibited Industries and Content (Where Applicable)

Depending on ExecClone's risk tolerance, the following industries or content types may be prohibited:

  • Adult content or services (pornography, escort services)
  • Gambling or online casinos (where unlicensed)
  • Cryptocurrency scams or pump-and-dump schemes
  • Multi-level marketing (MLM) or pyramid schemes
  • Payday loans or predatory lending
  • Unregulated pharmaceuticals or health products making false claims

Note: ExecClone reserves the right to evaluate use cases on a case-by-case basis.

3. Compliance with Laws

You are solely responsible for ensuring that your use of ExecClone services complies with all applicable federal, state, local, and international laws and regulations.

This includes, but is not limited to:

  • CAN-SPAM Act (15 U.S.C. § 7701 et seq.)
  • General Data Protection Regulation (GDPR)
  • California Consumer Privacy Act (CCPA)
  • Canada's Anti-Spam Legislation (CASL)
  • Telephone Consumer Protection Act (TCPA)
  • Electronic Communications Privacy Act (ECPA)
  • Computer Fraud and Abuse Act (CFAA)
  • Any applicable anti-fraud, consumer protection, or privacy laws

4. Enforcement and Suspension Rights

ExecClone LLC reserves the unilateral right to:

  • Investigate suspected violations of this AUP
  • Suspend or terminate accounts immediately, with or without notice
  • Remove or block content that violates this AUP
  • Cooperate with law enforcement or regulatory authorities
  • Take legal action against violators

Suspension Criteria

Your account may be suspended or terminated if:

  • You violate any provision of this AUP
  • ExecClone receives complaints or abuse reports regarding your use
  • Your use poses a risk to ExecClone's systems, reputation, or other users
  • We suspect fraudulent, abusive, or unlawful activity
  • You engage in activity that could result in legal liability for ExecClone

No Liability for Suspension

ExecClone is not liable for any damages, losses, or consequences resulting from suspension or termination of your account for AUP violations.

5. Reporting Violations

If you become aware of any violations of this AUP, please report them immediately to:

Email: jnewberry@execclone.com
Subject: AUP Violation Report

Include as much detail as possible, including:

  • Description of the violation
  • Evidence or examples (email headers, content, timestamps)
  • Any relevant account information

6. Consequences of Violations

Violations of this AUP may result in:

  • Immediate account suspension or termination
  • Forfeiture of prepaid fees (no refunds for violations)
  • Reporting to law enforcement or regulatory authorities
  • Legal action, including claims for damages, injunctive relief, or criminal prosecution
  • Blacklisting or public disclosure of violations (at ExecClone's discretion)

7. No Monitoring Obligation

ExecClone is not obligated to monitor user activity or content. However, we reserve the right to monitor, review, or investigate any activity or content as needed to enforce this AUP or comply with legal obligations.

8. Modifications to This AUP

ExecClone reserves the right to modify this AUP at any time. Changes will be posted on this page with an updated effective date. Continued use of ExecClone services after changes constitutes acceptance.

9. Contact Information

For questions or concerns regarding this Acceptable Use Policy, contact us:

ExecClone LLC
Email: jnewberry@execclone.com


Home | Privacy Policy | Terms of Service | EULA