Custovia Inc. · Reqify
Acceptable Use Policy
- Document version
- 1.0.0
- Effective date
- 8 May 2026
- Last updated
- 8 May 2026
- Contact
- [email protected]
Purpose
Reqify accelerates disciplined business-analysis documentation. Custovia prohibits activities that endanger recipients, degrade shared infrastructure integrity, circumvent billing, or collide with lawful content regulations.
Forbidden content & intents
- Generating or storing material promoting violence, hatred, exploitation, or illegal coercion.
- Uploading regulated health information without HIPAA-grade agreements when US healthcare compliance applies.
- Processing government-classified payloads absent written authorisation and hardware controls.
- Malware redistribution, ransomware staging, deceptive phishing kits, spyware command channels.
- Operational guidance for circumventing wage, anti-trust, or securities disclosure duties.
Infrastructure abuse
You may not attempt side-channel probing of Custovia infra, unauthorised load testing exceeding agreed commercial pilots, brute forcing authentication surfaces, forging webhook signatures, spoofing tenancy IDs, chaining multi-account evasion schemes, hoarding orphaned sandboxes intentionally, draining credits through scripted loops outside fair-use expectations, mining cryptocurrency on Reqify VMs, or port-scanning ancillary services surfaced only for legitimate webhook callbacks.
Responsible AI practice
Model outputs constitute aids — never substitute fiduciary, medical, licensed engineering, export-control, or courtroom representation without verification. Custovia forbids deceptive impersonation facilitated by deep synthetic voices or forged credentials inside generated artefacts destined for regulatory filing without human sign-off aligning to your jurisdictional mandates.
Investigations & escalation
Trusted reporters, automated abuse scanners, subpoenas, credible CSAM intel, Stripe fraud scores, anomaly detection dashboards, rotating secret leaks, whistleblowing hotlines administered by Custovia counsel, and cross-cloud threat intel alliances may jointly trigger freezes, lawful preservation headers, narrowly tailored log sampling, reversible account pauses preceding customer communication where safety demands, escalation to supervisory authorities compelled by statutes, forensic snapshot exports for enterprise retainers indemnifying chain-of-custody, Stripe refund routing, mandated regional counsel briefings — enumerated illustratively rather than exclusively.
Appeals
If you believe we mis-flagged benign usage write from your organisation domain describing timestamps, project IDs anonymised hashes, artefacts under dispute, corrective mitigations pledged, supervisory chain, remediation timeline, lawful basis you assert resisting takedown, plus references to contradictory policy language — enabling balanced reinstatement scrutiny without prejudicing imminent harm investigations already lawfully gated.