Acceptable Use Policy

This Acceptable Use Policy ("Acceptable Use Policy", "AUP", "Policy", or "the policy") sets the terms of acceptable and unacceptable conduct when accessing the content, data, metadata, application programming interfaces, software development kits, sample code, command line tools, developer tools and other related documentation and materials made available by Distal Labs LLC ("Fedified", "Yirpi", "Distal Labs", "we", "us", "our", or "ours") including, without limitation, through Fedified's websites and application programming interfacies (collectively, "Services"). Throughout this document, "you" and "your" refers to the individual, company or legal entity that you represent and, as applicable and as permitted by law, the entity or entities to which you furnish services or work products derived from our Services.

This document, together with our Privacy Policy and, as applicable, our Developer Policy and API Terms of Service, constitute a binding "Contract" between you and us. Please read these documents carefully.

If, at our sole discretion and judgment, we believe a violation of the Contract is deliberate, repeated or presents a risk of harm to you, other users, the Services, or any third parties, we may suspend or permanently terminate your access to our Services without notice.

If you do not accept these terms or if you lack authority or capacity to be a party to this Contract, then you are not authorized to use our Services. By using our Services, you agree to be bound by the terms of this Contract.

Effective: May 12, 2023

Last updated: May 12, 2023


You hereby agree to:

  • comply with all Service terms, conditions, and policy documents- including this one;

  • comply with all applicable laws and governmental regulations, including, but not limited to, all intellectual property, data, privacy, and export control laws, and regulations promulgated by any government agencies, including, but not limited to, the U.S. Department of Justice, the U.S. Securities and Exchange Commission, and the U.S. Department of the Treasury;

  • keep all access credentials used in connection with our Services secure and confidential;

  • monitor and control all activity conducted using your access credentials in connection with our Services;

  • use reasonable efforts to prevent unauthorized access to or use of our Services; and

  • promptly notify us if you become aware of, or reasonably suspect, any illegal or unauthorized activity or a security breach involving your access credentials, including any loss, theft, or unauthorized disclosure or use of a username, password, API key, or authorization token.

You hereby agree to NOT:

  • engage in illegal activity using our Services;

  • promote or amplify calls for violence, hatred, or targeted harassment against individuals or groups;

  • use Services in any manner that could reasonably be deemed harmful to minors or to adults without the legal capacity, authority, or agency to consent and/or to make informed decisions;

  • share, transfer or otherwise provide access to the Services to another entity without our express written permission;

  • place, or cause a third-party to place, advertisements within our Services;

  • impersonate any individual or entity or falsely state or otherwise misrepresent your affiliation with a person, organization or entity;

  • use Services to impersonate or misappropriate a third-party's identity, reputation, or brand;

  • use Services to build contact lists for use on a third-party system;

  • use Services to send unsolicited communications, promotions, or advertisements, or spam;

  • use Services to store or transmit any data that may infringe upon trademarks, copyrights, or other intellectual property, or that uses intellectual property in any way that may be unlawful, or reasonably assumed to be tortious;

  • use Services to upload and/or disseminate data to which you do not retain all required rights under law and under any applicable contractual and fiduciary agreements (such as proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements);

  • use Services to provide direct or indirect material support or resources (or to conceal or disguise the nature, location, source, or ownership of material support or resources) to any organization(s) designated by the United States government as a foreign terrorist organization;

  • use Services to provide direct or indirect material support or resources (or to conceal or disguise the nature, location, source, or ownership of material support or resources) to any entity sanctioned by the United States government persuant to the authority granted to the U.S. Department of the Treasury's Office of Foreign Assets Control;

  • access or use the Services on behalf of, or for the benefit of, any Patent Assertion Entity;

  • hotlink, embed, scrape, white-label, or otherwise misappropriate, disseminate, or commercialize our Services without express written consent;

  • access the Services by any means other than our publicly supported interfaces;

  • access the Services in order to build a similar or competitive product or service or copy any ideas, features, functions, or graphics of our Services;

  • sublicense, resell, white-label, time share or similarly exploit our Services;

  • attempt to reverse engineer, decompile, hack, disable, interfere with, disassemble, modify, copy, translate, or disrupt the features, functionality, integrity, or performance of the Services (including any mechanism used to restrict or control the functionality of the Services), any third party use of the Services, or any third party data contained therein (except to the extent such restrictions are prohibited by law);

  • upload to, or transmit from, the Services any data, file, software, or link that contains or redirects to software, scripts, protocols, servers, third-party services, or any other technology that surreptitiously or unlawfully accesses or downloads content or information stored within the Services or on any third-party hardware or computer network;

  • attempt to gain unauthorized access to the Services or related systems or networks or to defeat, avoid, bypass, remove, deactivate, or otherwise circumvent any software protection or monitoring mechanisms of the Services; or

  • authorize, permit, enable, induce or encourage any third party to do anything listed in this section.


Contact Us

This policy will change as our Services evolve, so please check back regularly for updates. For any questions regarding this document, you may contact us at contact@fedified.com