Acceptable Use Policy
This Acceptable Use Policy ("Policy") governs your use of the services offered by Railway Corporation ("Railway") and its affiliates ("Services") and our website(s) including Railway.com ("Railway Site"). We may modify this Policy by posting a revised version on the Railway Site. By using the Services or accessing the Railway Site, you agree to the latest version of this Policy.
You may not use, or facilitate or allow others to use the Services or the Railway Site:
- for any activity that violates applicable law, exploits or harms minors, promotes terrorism, violent extremism, or human trafficking;
- for any activity that involves creating or distributing nonconsensual intimate imagery or other content used to harass, threaten, or intimidate;
- to deceive others or obtain unauthorized benefit, including through phishing, social engineering, payment or card fraud, impersonation, misrepresentation of affiliation, or operating or promoting fraudulent schemes such as Ponzi, pyramid, or advance-fee fraud;
- to host, distribute, or make available copyrighted or pirated software, media, or other materials without proper authorization from the rights holder;
- to gain unauthorized access to systems or data, distribute malware, operate attack infrastructure (such as DDoS tools or botnets), or spoof network or email identities;
- to send unsolicited bulk messages through any communication channel, including email and SMS; or
- for other abuse of the platform, including cryptocurrency mining, torrenting, reselling compute resources, evading usage or billing limits, operating proxies or anonymization services, or running bots or scrapers that violate applicable terms of service.
Enforcement
Railway may investigate any suspected violation of this Policy, and remove or disable access to any content or resource that violates this Policy. You agree to cooperate with Railway to remedy any violation.
When determining whether a violation has occurred, Railway may consider your ability and willingness to comply, including the policies and processes you have in place to prevent or identify and remove any prohibited content or activity.
If you are unsure whether your use case is allowed, ask us before deploying.