Acceptable Use Policy

This policy explains how you may use Rytinco's services and outlines prohibited activities to protect our users and platform.

Last updated: November 12, 2025

1. Purpose and Scope

This Acceptable Use Policy establishes rules for the proper use of Rytinco's services and platform to ensure a safe and compliant environment for all users.

1.1 Policy Integration

This Acceptable Use Policy ("AUP," "Policy") governs your use of all Rytinco Group (Proprietary) Limited ("Rytinco," "we," "us," or "our") services, including but not limited to:

  • Rytinco website and web platform (rytinco.com and app.rytinco.com)
  • Qlinks (dynamic QR codes and branded shortlinks)
  • No-code landing page builder and custom page hosting
  • Form builder and submission management
  • Analytics and reporting dashboards
  • Custom domain and branded URL services
  • Workspace and campaign management tools
  • Any future services or features

This Policy supplements and forms an integral part of our Terms of Service. By using our services, you agree to comply with both documents.

1.2 Legal Framework

This Policy is established under South African law, including the Electronic Communications and Transactions Act 25 of 2002, and applies to all users regardless of their location. Users are responsible for ensuring compliance with applicable local laws in their jurisdiction.

User Responsibility: You are fully responsible for all content, activities, and communications conducted through your account and Qlinks, including actions by authorized users or third parties.

2. Prohibited Content and Activities

You may not use our services to create, host, distribute, link to, or facilitate access to any prohibited content or activities listed below.

2.1 Illegal and Harmful Content

Legal Violations

  • Content that violates South African law or applicable international laws
  • Activities prohibited under the Electronic Communications and Transactions Act
  • Violations of consumer protection, privacy, or competition laws
  • Content that violates court orders, injunctions, or regulatory requirements

Intellectual Property Infringement

  • Copyright, trademark, patent, or trade secret infringement
  • Unauthorized use of proprietary content, software, or databases
  • Distribution of pirated software, media, or other copyrighted materials
  • Circumvention of digital rights management (DRM) systems

Harmful and Abusive Content

  • Hate speech, harassment, bullying, or threats of violence
  • Content promoting self-harm, suicide, eating disorders, or dangerous activities
  • Doxxing (publishing private personal information without consent)
  • Defamatory content or false statements intended to harm reputation
  • Discriminatory content based on race, religion, gender, sexuality, or other protected characteristics

2.2 Illegal Activities and Services

Criminal Activities

  • Promotion or facilitation of human trafficking, exploitation, or modern slavery
  • Child abuse, exploitation, or any content involving minors in harmful situations
  • Drug trafficking, illegal weapons sales, or controlled substance distribution
  • Money laundering, terrorist financing, or sanctions evasion
  • Identity theft, document fraud, or impersonation schemes

Fraudulent and Deceptive Practices

  • Phishing, social engineering, or credential harvesting
  • Ponzi schemes, pyramid schemes, or other fraudulent investment opportunities
  • Counterfeit goods, fake certifications, or false product claims
  • Romance scams, advance fee fraud, or other confidence schemes
  • Fake reviews, testimonials, or misleading endorsements

Adult and Explicit Content

  • Sexually explicit content involving minors (zero tolerance policy)
  • Non-consensual intimate content or "revenge" sharing
  • Escort services, prostitution, or sexual services for payment
  • Extreme or violent sexual content
  • Content that objectifies or sexualizes minors

2.3 Malicious Technology and Security Threats

Zero Tolerance: Any use of our platform to distribute malware, conduct cyberattacks, or compromise security will result in immediate account termination and reporting to authorities.

3. Security Violations and Technical Abuse

Any attempt to compromise the security, integrity, or availability of our services or other systems is strictly prohibited.

3.1 Prohibited Security Activities

Unauthorized Access and Testing

  • Probing, scanning, or testing vulnerabilities of our systems or networks without explicit written authorization
  • Attempting to gain unauthorized access to user accounts, systems, or data
  • Exploiting security vulnerabilities for any purpose other than responsible disclosure
  • Reverse engineering, decompiling, or attempting to discover source code
  • Using our services to scan, probe, or test third-party systems without authorization

Service Disruption and Abuse

  • Distributed denial-of-service (DDoS) attacks or similar network abuse
  • Intentional interference with service operations or other users' access
  • Consuming excessive system resources or bandwidth without authorization
  • Creating artificial traffic patterns to manipulate analytics or system performance
  • Attempting to circumvent usage limits, rate limiting, or access controls

Data and Credential Misuse

  • Misuse of access tokens, API keys, session data, or authentication credentials
  • Sharing, selling, or distributing account credentials or access tokens
  • Using compromised credentials or unauthorized access methods
  • Harvesting, scraping, or collecting user data without consent
  • Attempting to access data belonging to other users or accounts

3.2 Automated Abuse and Manipulation

Prohibited Automation

  • Using bots, scripts, or automated tools to create bulk accounts or Qlinks for abusive purposes
  • Automated clicking, scanning, or interaction designed to inflate metrics artificially
  • Mass creation of content or accounts to circumvent restrictions or limits
  • Automated harvesting of content, data, or personal information

Respectful Usage Requirements

  • Respect robots.txt files, terms of service, and usage restrictions of destination websites
  • Honor rate limits and usage guidelines provided by third-party services
  • Avoid overwhelming target servers or services with excessive traffic
  • Comply with API terms and usage restrictions for integrated services

4. Communications and Marketing Compliance

All communications sent through or linked via our platform must comply with applicable anti-spam laws and consent requirements.

4.1 Email and Electronic Communications

When using our services for messaging, email marketing, or notifications, you must comply with all applicable laws including:

Legal Compliance Requirements

  • South Africa's Protection of Personal Information Act (POPIA)
  • Electronic Communications and Transactions Act (ECTA)
  • European Union General Data Protection Regulation (GDPR) where applicable
  • CAN-SPAM Act (United States) for recipients in the US
  • Canada's Anti-Spam Legislation (CASL) for Canadian recipients
  • Other applicable regional privacy and anti-spam laws

4.2 Required Practices

Consent and Authorization

  • Obtain proper consent before sending commercial communications
  • Maintain records of consent and opt-in processes
  • Ensure consent is freely given, specific, informed, and unambiguous
  • Provide clear information about data processing purposes

Message Requirements

  • Include clear sender identification in all messages
  • Provide accurate subject lines and message content
  • Include functioning unsubscribe mechanisms
  • Honor unsubscribe requests promptly (within 10 business days)

4.3 Prohibited Communications Practices

  • Sending unsolicited commercial messages without proper consent
  • Using deceptive subject lines, sender names, or routing information
  • Failing to provide working unsubscribe mechanisms
  • Continuing to send messages after unsubscribe requests
  • Harvesting email addresses or contact information without consent
  • Using purchased or rented contact lists without verified consent
  • Sending chain letters, pyramid schemes, or viral marketing campaigns

5. Network Usage and Rate Limits

Fair usage policies apply to ensure reliable service for all users. Excessive usage may result in rate limiting or account restrictions.

5.1 Usage Limitations

Rate and Volume Limits

  • Do not exceed reasonable scan/click rates intended for normal human use
  • Respect plan-based usage limits and surcharge thresholds
  • Avoid generating artificial or inflated traffic patterns
  • Do not create excessive server load through rapid or bulk requests

Prohibited Usage Patterns

  • Bulk or automated scanning without express written authorization
  • Using Qlinks for drive‑by redirects, cloaking, or enforcement evasion
  • Creating redirect chains or loops that waste system resources
  • Using our platform for bandwidth testing or load testing without permission

5.2 Fair Use and Resource Management

To ensure service quality for all users:

  • Use resources proportionally to your subscription plan and intended business purpose
  • Contact us before implementing high-volume or automated use cases
  • Report any suspected abuse or unusual traffic patterns you observe
  • Comply with any rate limits or usage restrictions we may implement

Enterprise Users: If you need higher usage limits or custom arrangements, please contact our sales team to discuss enterprise pricing and dedicated resources.

6. Policy Enforcement and Reporting

Violation of this Acceptable Use Policy may result in immediate service suspension, account termination, and legal action where appropriate.

6.1 Investigation and Enforcement Process

When we receive reports of policy violations or detect suspicious activity, we may:

  1. Investigate the alleged violation and gather relevant evidence
  2. Temporarily suspend access to specific Qlinks or account features
  3. Request additional information or clarification from the account holder
  4. Take appropriate enforcement action based on the severity and nature of the violation
  5. Report illegal activities to relevant law enforcement authorities
  6. Cooperate with legal investigations and court orders as required

6.2 Enforcement Actions

Depending on the severity and nature of the violation, we may take the following actions:

Immediate Actions

  • Content removal or modification
  • Qlink deactivation or redirection
  • Temporary service suspension
  • Account access restrictions

Severe Violations

  • Permanent account termination
  • Legal action and law enforcement reporting
  • IP address or device blocking
  • Forfeiture of subscription fees

6.3 Reporting Abuse and Violations

Report Policy Violations

Abuse Reports

For violations of this policy:

abuse@rytinco.com

Copyright Issues

For intellectual property violations:

legal@rytinco.com

General Support

For questions about this policy:

support@rytinco.com

Emergency

For immediate safety concerns:

Contact local law enforcement first, then notify us

When reporting violations, please provide as much detail as possible, including URLs, timestamps, screenshots, and a clear description of the concern.

6.4 Appeals Process

If you believe enforcement action was taken in error, you may appeal by contacting legal@rytinco.com with a detailed explanation. Appeals will be reviewed by our legal and compliance team within 14 business days.

7. Policy Updates and Changes

7.1 Amendment Process

We may update this Acceptable Use Policy from time to time to reflect changes in:

  • Applicable laws and regulations
  • Our service offerings and features
  • Industry standards and best practices
  • Emerging security threats and abuse patterns
  • User feedback and operational experience

7.2 Notification and Acceptance

When we make changes to this Policy:

  1. We will update the "Last updated" date at the top of this page
  2. For material changes, we will provide reasonable advance notice through email or platform notifications
  3. We may highlight significant changes in our communications
  4. Continued use of our services after changes become effective constitutes acceptance of the revised Policy
  5. If you do not agree to the changes, you must cease using our services

Stay Informed: We recommend reviewing this Policy periodically to stay informed about acceptable use requirements and any changes that may affect your use of our services.

8. Contact Information and Legal Framework

Policy Inquiries and Compliance

Legal and Policy Questions

For questions about this policy or legal compliance:

Email: legal@rytinco.com

Response time: 2-5 business days

Technical Support

For account or service-related questions:

Email: support@rytinco.com

Response time: 1-2 business days

Company Information

Company: Rytinco Group (Proprietary) Limited

Jurisdiction: Republic of South Africa

Address: Cape Town, South Africa

Legal Framework: South African law applies to this Policy

Policy Integration: This Acceptable Use Policy works together with our Terms of Service, Privacy Policy, and Copyright Infringement Policy to govern your use of our services.

Questions About This Policy?

Our team is here to help clarify acceptable uses of our platform.

Contact Legal