Acceptable Use Policy (AUP) - Crypto and Coffee on Akash Network

Last Updated: August 26, 2023

Table of Contents



This Acceptable Use Policy ("AUP") governs your use of the services ("Services") provided by Crypto and Coffee ("Company", "provider" "we", "us", "our"). This AUP is designed to ensure the integrity, security, reliability, and privacy of both the Company's network and the products and services it provides to its customers. By using our Services, you agree to comply with this AUP and to remain responsible for its compliance at all times.

1. General Responsibilities

1.1 This AUP applies to all persons and entities (collectively, "users") utilizing our Services, including those who have accounts and those who do not ("Your Users").

1.2 You are responsible for violations of this AUP by any person using your account, with or without your permission.

1.3 We reserve the right to modify this AUP at any time. Any changes will be effective immediately upon posting the revised AUP on our website.

2. Illegal or Abusive Activity or Content

2.1 Illegal Activities: The Services must not be used for illegal activities, including but not limited to promoting or encouraging illegal conduct. This prohibition includes disseminating content that has been ruled unlawful by a competent jurisdiction.

2.2 Fraudulent or Harmful Activities: Engaging in deceptive practices or activities that are harmful to others or to Crypto and Coffee's operations or reputation is not allowed.

2.3 Intellectual Property: Users are prohibited from violating or infringing on the intellectual property rights of others, including copyrights, patents, and trademarks.

2.4 Unlawful Pornography: It is prohibited to disseminate child pornography or any sexually explicit material obtained without the consent of the participants.

2.5 Violent, Harassing, or Abusive Content: Content that incites violence, harassment, or abuse is prohibited.

2.6 Controlled Substances: The Services must not be used for the distribution of controlled or illegal substances.

3. Security Violations

3.1 Harmful Software: Users may not distribute harmful software such as viruses, worms, or any software intended to damage systems.

3.2 Unauthorized Access: Accessing any system without permission is prohibited.

3.3 Data Interception: Unauthorized monitoring or interception of data is not allowed.

3.4 Falsification of Origin: Users are prohibited from altering the origin of data packets and must not use anonymous remailers or similar techniques to deceive recipients or forge data.

4. Network Abuse

4.1 Monitoring or Crawling: Users must not monitor or crawl systems to an extent that impairs or disrupts the system being monitored.

4.2 Deceitful Actions: Introducing malicious code, or using deceptive practices to collect information is not allowed.

4.3 Intentional Interference: Users must not interfere with the functioning of any system, including any deliberate attempts to overload.

4.4 Unauthorized Network Services: Operating open proxies, open mail relays, or similar services is prohibited.

4.5 Avoiding System Restrictions: Users must not circumvent limitations placed on their usage of the Services.

4.6 Retaliation: Activities that result in retaliation against Crypto and Coffee, such as DoS attacks, are not allowed.

4.7 Identity Concealment: Activities intended to withhold identity, such as omitting or misreporting transmission data, are not allowed.

5. E-Mail and Message Abuse

5.1 Spamming: Sending unsolicited bulk or commercial messages is prohibited.

5.2 E-mail Regulations: Users must comply with all applicable laws relating to e-mail and messaging, including CAN-SPAM and GDPR.

6. Vulnerability Testing

6.1 Users may not test the vulnerability of Crypto and Coffee systems or networks without prior written consent.

7. Excessive Use of Resources

7.1 Users must not consume an excessive amount of shared resources, including CPU time, memory, and session time.

8. Indemnification for Payment Disputes

8.1 All payments are processed on-chain and governed by the Akash software and blockchain. Crypto and Coffee is indemnified from any payment disputes arising out of or related to the blockchain transactions.

9. Content Moderation

9.1 We employ various content moderation tools, including SightEngine, to monitor compliance with this AUP.

10. Monitoring and Enforcement

10.1 We reserve the right to monitor compliance with this AUP and to restrict service for non-compliance.

10.2 Violation of this AUP may result in the termination of your service.

11. Reporting of Violations

11.1 To report violations of this AUP, please contact us.


  • No products in the cart.