Acceptable Use Policy
Last updated: October 28, 2025
1. Purpose and Scope
This Acceptable Use Policy ("Policy") governs your use of App Bouncer's identity verification services ("Service"). This Policy is incorporated into and forms part of our Terms of Service. By using our Service, you agree to comply with this Policy.
App Bouncer is committed to providing a secure, reliable, and compliant identity verification platform. This Policy helps ensure that our services are used responsibly and lawfully by all users.
2. Acceptable Uses
You may use our Service for legitimate business purposes, including:
- Identity Verification: Verifying the identity of users, customers, or employees
- Compliance Requirements: Meeting regulatory obligations such as KYC (Know Your Customer) and AML (Anti-Money Laundering)
- Fraud Prevention: Protecting against identity theft, account takeovers, and fraudulent activities
- Age Verification: Confirming age for age-restricted services or products
- Access Control: Controlling access to secure systems, facilities, or services
- Onboarding: Streamlining customer or employee onboarding processes
3. Prohibited Activities
The following activities are strictly prohibited when using our Service:
3.1 Illegal Activities
- Using the Service for any illegal purpose or in violation of applicable laws
- Facilitating money laundering, terrorist financing, or other financial crimes
- Supporting illegal gambling, drug trafficking, or other criminal activities
- Violating export control laws or trade sanctions
3.2 Fraudulent Activities
- Submitting false, misleading, or fabricated identity information
- Using stolen, counterfeit, or forged identification documents
- Creating fake accounts or identities
- Attempting to circumvent verification processes or security measures
- Engaging in identity theft or impersonation
3.3 System Abuse
- Attempting to gain unauthorized access to our systems or data
- Reverse engineering, decompiling, or disassembling our software
- Conducting security testing without prior written authorization
- Introducing malware, viruses, or other harmful code
- Overloading our systems through excessive API calls or requests
- Scraping or harvesting data from our platform
3.4 Privacy Violations
- Collecting or processing personal data without proper consent
- Sharing verification results with unauthorized third parties
- Using personal data for purposes beyond identity verification
- Retaining personal data longer than necessary or permitted
- Failing to implement appropriate data security measures
3.5 Discriminatory Practices
- Using our Service to discriminate based on protected characteristics
- Implementing verification processes that disproportionately impact certain groups
- Denying services based on nationality, ethnicity, or other protected status
- Violating fair lending or equal opportunity laws
3.6 Commercial Restrictions
- Reselling or redistributing our Service without authorization
- Creating competing identity verification services using our platform
- Using our Service to verify identities for high-risk industries without approval
- Bypassing usage limits or restrictions
4. High-Risk Use Cases
Certain use cases require additional approval and compliance measures:
4.1 Restricted Industries
- Financial Services: Banking, lending, cryptocurrency, investment services
- Gaming and Gambling: Online casinos, sports betting, lottery services
- Adult Content: Age-restricted content and services
- Healthcare: Medical services, telehealth, pharmaceutical sales
- Government Services: Voting systems, benefits administration
4.2 Additional Requirements
High-risk use cases may require:
- Enhanced due diligence and compliance documentation
- Additional security measures and monitoring
- Regular compliance audits and reporting
- Higher service fees and extended contract terms
5. Data Handling Requirements
When using our Service, you must:
- Obtain Consent: Secure proper consent before collecting personal data
- Limit Collection: Collect only data necessary for verification purposes
- Secure Storage: Implement appropriate security measures for data protection
- Respect Rights: Honor user rights regarding their personal data
- Delete Promptly: Delete verification data when no longer needed
- Comply with Laws: Follow applicable data protection regulations
6. API and Integration Guidelines
6.1 Technical Requirements
- Implement proper error handling and retry logic
- Use secure communication protocols (HTTPS/TLS)
- Store API keys and credentials securely
- Respect rate limits and usage quotas
- Monitor and log API usage appropriately
6.2 Integration Standards
- Follow our integration best practices and documentation
- Implement proper user experience flows
- Provide clear privacy notices to end users
- Handle verification results appropriately
- Report technical issues promptly
7. Monitoring and Compliance
App Bouncer reserves the right to:
- Monitor usage patterns and behavior for compliance purposes
- Investigate suspicious activities or potential violations
- Request additional documentation or information
- Conduct periodic compliance reviews and audits
- Implement additional security measures as needed
8. Consequences of Violations
Violations of this Policy may result in:
8.1 Warning and Remediation
- Written warnings and requests for corrective action
- Required compliance training or consultation
- Enhanced monitoring and reporting requirements
- Temporary restrictions on service usage
8.2 Service Restrictions
- Suspension of API access or service functionality
- Reduction of usage limits or quotas
- Requirement for enhanced security measures
- Additional compliance obligations
8.3 Account Termination
- Immediate termination for severe violations
- Permanent ban from using our services
- Forfeiture of prepaid fees or deposits
- Legal action for damages or losses
9. Reporting Violations
If you become aware of any violations of this Policy, please report them immediately. You can:
- Contact our compliance team through our support channels
- Report security incidents or suspected abuse
- Provide detailed information about the violation
- Cooperate with our investigation process
We take all reports seriously and will investigate promptly while maintaining appropriate confidentiality.
10. Policy Updates
We may update this Acceptable Use Policy from time to time to reflect:
- Changes in applicable laws and regulations
- Evolution of security threats and best practices
- Feedback from users and compliance experts
- New features or services we offer
We will notify you of material changes through email notifications and prominent website notices. Continued use of our Service after policy updates constitutes acceptance of the revised terms.
11. Contact Information
If you have questions about this Acceptable Use Policy or need guidance on compliance matters, please contact us. Our compliance team is available to help ensure your use of our Service meets all requirements.