Acceptable Use Policy
This Acceptable Use Policy ("AUP") sets out the rules governing what activities are permitted and prohibited when using Proxiware's proxy infrastructure. Violations may result in immediate account suspension or termination.
1Scope & Agreement
This Acceptable Use Policy governs all use of Proxiware LLC's Services, including but not limited to residential proxies, static ISP proxies, unlimited residential proxies, mobile proxies, datacenter proxies, APIs, and any associated platform features.
This AUP is incorporated by reference into Proxiware's Terms of Service. By accessing or using any Proxiware Service, you agree to comply with this AUP in full. If you do not agree to these terms, you must not access or use the Services.
This AUP applies to: (a) all registered users; (b) any person or entity accessing the Services through a registered user's credentials; (c) any person or entity accessing the Services via the Proxiware API; and (d) any sub-users or end-users provisioned through your Account.
2Permitted Uses
Proxiware's Services are designed for legitimate business and personal use cases. Examples of permitted uses include:
- Web Intelligence & Data Collection: Lawful collection of publicly available data from websites that permit such access under their terms of service, for market research, price monitoring, competitive intelligence, and similar purposes;
- Brand Protection: Monitoring the web for unauthorized use of trademarks, counterfeit goods, and other intellectual property infringement;
- Ad Verification: Verifying the placement and integrity of online advertising;
- SEO Monitoring: Tracking search engine rankings and website visibility across geographies;
- Cybersecurity Research: Lawful security research, vulnerability assessment, and penetration testing performed on systems you own or have explicit written authorization to test;
- Geo-targeting Testing: Testing application or content behavior across different geographic regions;
- Privacy Protection: Individuals using proxies to protect personal privacy and anonymity in accordance with applicable law;
- Application Development & QA: Testing and development of applications that interact with web services.
This list is illustrative, not exhaustive. If you are unsure whether your intended use is permitted, contact us at [email protected] before proceeding.
3Prohibited Activities — Overview
The following activities are strictly prohibited and will result in immediate account suspension or termination, potential legal action, and referral to appropriate authorities. This list is not exhaustive — Proxiware reserves the right to determine, at its sole discretion, whether any use constitutes a violation of this AUP.
Prohibited uses are organized into the following categories, each described in detail in Sections 4–10:
- Section 4: Illegal Activity
- Section 5: Harmful & Abusive Conduct
- Section 6: Network & Infrastructure Abuse
- Section 7: Privacy & Data Protection Violations
- Section 8: Prohibited Automated Access & Scraping
- Section 9: Intellectual Property Violations
- Section 10: Sanctions & Export Control Violations
4Illegal Activity
You may not use the Services to engage in, facilitate, or promote any activity that violates applicable local, state, national, or international laws or regulations, including but not limited to:
- Criminal Activity: Any activity constituting a crime under applicable law, including fraud, theft, extortion, blackmail, or the unauthorized access to computer systems under the Computer Fraud and Abuse Act (CFAA) or equivalent laws;
- Child Sexual Abuse Material (CSAM): Distribution, transmission, storage, or facilitation of any child sexual abuse material or child exploitation content in any form. Proxiware has zero tolerance for this and will immediately report any suspected violations to NCMEC and law enforcement;
- Human Trafficking: Facilitating human trafficking, forced labor, sexual exploitation, or any related activity;
- Terrorist & Extremist Activity: Supporting, financing, or facilitating terrorism, extremism, or violent radicalization;
- Drug Trafficking: Facilitating the illegal sale, distribution, or manufacture of controlled substances;
- Weapons Trafficking: Facilitating the illegal sale, distribution, or acquisition of firearms, explosives, or other weapons;
- Dark Web Markets: Operating or accessing illegal dark web marketplaces or services using Proxiware's infrastructure;
- Financial Fraud: Money laundering, wire fraud, investment fraud, insurance fraud, or any other form of financial deception.
5Harmful & Abusive Conduct
You may not use the Services to engage in conduct that is harmful, abusive, or harassing, including:
- Spam & Unsolicited Communications: Sending unsolicited commercial emails (spam), SMS messages, or other communications in violation of the CAN-SPAM Act, TCPA, or equivalent regulations;
- Phishing & Social Engineering: Creating or operating phishing websites, clone sites, or social engineering campaigns designed to deceive users into revealing credentials or sensitive information;
- Credential Stuffing & Account Takeover: Using automated tools to test stolen credentials against web services for unauthorized account access;
- Doxxing: Collecting, compiling, or publishing private personal information about individuals without their consent and with intent to harm;
- Stalking & Harassment: Using the Services to monitor, track, or harass specific individuals without lawful basis;
- Malware Distribution: Distributing, hosting, or facilitating the spread of malware, ransomware, spyware, trojans, botnets, or any other malicious software;
- Botnet Operation: Operating command and control infrastructure for botnets or coordinating automated attacks.
6Network & Infrastructure Abuse
You may not use the Services to attack, degrade, or disrupt network infrastructure or services:
- DDoS & DoS Attacks: Conducting, facilitating, or directing distributed denial-of-service (DDoS) or denial-of-service (DoS) attacks against any target;
- Port Scanning & Enumeration: Conducting unauthorized network scans, port scans, or vulnerability scans against systems you do not own;
- Exploitation & Intrusion: Attempting to exploit vulnerabilities, gain unauthorized access to systems, or escalate privileges on any system without proper authorization;
- Packet Injection & Interception: Intercepting, forging, or injecting network packets to manipulate communications;
- IP Spoofing: Forging IP addresses or routing information to conceal origin or impersonate another host;
- BGP Hijacking: Illegitimately announcing or manipulating IP address space routing;
- Proxiware Infrastructure Abuse: Attempting to bypass rate limits, authentication systems, or access controls on Proxiware's own infrastructure; accessing proxy endpoints not allocated to your account; or intentionally degrading service quality for other users.
7Privacy & Data Protection Violations
You may not use the Services in a manner that violates the privacy rights of others or applicable data protection law:
- Collecting personal data about individuals without a lawful basis under applicable data protection law (GDPR, CCPA, etc.);
- Aggregating personal information without authorization in ways that could enable identity theft or targeted harassment;
- Bypassing privacy controls, CAPTCHA systems, or bot detection without authorization;
- Accessing systems or databases containing personal data without authorization;
- Scraping personal information (names, contact details, financial information) for the purpose of building unauthorized marketing lists or data broking operations in violation of applicable law.
8Automated Access & Scraping
Proxiware's Services may be used for lawful automated access and data collection. However, the following activities are prohibited:
- Scraping websites that explicitly prohibit automated access in their robots.txt file or Terms of Service, where such prohibition is enforceable under applicable law;
- Conducting automated access in volumes that cause material disruption to target services;
- Circumventing access controls, CAPTCHAs, or anti-bot measures deployed by target services beyond what is legally permitted;
- Using the Services to access copyrighted content in a manner that infringes on the rights of copyright owners;
- Using the Services to collect non-public personal information for purposes prohibited under applicable privacy law.
You are solely responsible for ensuring that your data collection activities comply with all applicable laws and the terms of service of websites you access. Proxiware does not provide legal advice regarding the permissibility of specific scraping activities.
9Intellectual Property Violations
You may not use the Services to infringe or facilitate the infringement of any third-party intellectual property rights, including:
- Distributing, hosting, or facilitating access to pirated software, movies, music, or other copyrighted materials;
- Operating or supporting streaming piracy services or piracy networks;
- Circumventing digital rights management (DRM) systems in violation of applicable law;
- Creating counterfeit products, websites, or brand impersonation operations;
- Trademark infringement or unauthorized use of third-party brand assets.
10Sanctions & Export Control
You may not use the Services to:
- Circumvent geographic access restrictions or content controls imposed by applicable sanctions regimes (OFAC, EU, UN, UK);
- Access or interact with sanctioned individuals, entities, or territories;
- Facilitate the transfer of technology, software, or services to prohibited jurisdictions or end-users in violation of U.S. Export Administration Regulations (EAR) or International Traffic in Arms Regulations (ITAR);
- Use the Services from or on behalf of comprehensively sanctioned jurisdictions, including Cuba, Iran, North Korea, Syria, or the Crimea/Donetsk/Luhansk regions of Ukraine.
For full details of our sanctions compliance program, see our KYC Policy.
11User Responsibilities
You are solely and fully responsible for:
- All activities conducted through your Account, whether authorized by you or not;
- Ensuring all sub-users, employees, contractors, and agents accessing the Services comply with this AUP;
- The legality of your data collection, processing, and storage activities under applicable law;
- Obtaining any required consents, licenses, or permissions from third parties before using the Services to access their systems or data;
- Maintaining the security of your Account credentials and promptly reporting any unauthorized use to Proxiware;
- Promptly correcting any activity that Proxiware notifies you is in violation of this AUP.
Proxiware acts solely as a network access provider and does not control the specific activities conducted through its Services. Proxiware is not responsible for User-generated content, data collected by Users, or the lawfulness of User activities conducted through the Services.
12Monitoring & Enforcement
Proxiware reserves the right, but not the obligation, to:
- Monitor, investigate, and analyze usage patterns on the Proxiware platform for evidence of AUP violations or abuse;
- Investigate complaints from third parties or law enforcement regarding alleged violations;
- Cooperate with law enforcement agencies in the investigation of suspected illegal activity;
- Preserve evidence in connection with ongoing legal proceedings or government investigations.
Proxiware does not monitor or log the content of traffic routed through its proxies. However, metadata and usage patterns may be analyzed as part of abuse investigations.
13Reporting Abuse
If you believe that Proxiware's Services are being used in violation of this AUP, or if you have identified malicious activity originating from Proxiware IP addresses, please report it immediately:
Please include in your report: a description of the activity, affected IP addresses, timestamps, log evidence, and any other relevant information. We take all abuse reports seriously and will investigate promptly.
14Consequences of Violation
Violations of this AUP may result in the following actions, at Proxiware's sole discretion:
- Warning: For minor or first-time violations, Proxiware may issue a formal warning requiring corrective action within a specified timeframe;
- Throttling or Rate Limiting: Temporary restriction of bandwidth or request rates;
- Temporary Suspension: Immediate suspension of account access pending investigation;
- Permanent Termination: Immediate and permanent termination of the Account and all associated Services, with forfeiture of any unused Account Credit where permitted by this Agreement;
- Legal Action: Civil litigation for damages, injunctive relief, or other legal remedies;
- Law Enforcement Referral: Reporting suspected criminal activity to law enforcement agencies, regulatory bodies, or other competent authorities, including NCMEC for child exploitation material.
For violations involving illegal activity, child exploitation, terrorism, or imminent risk of harm, Proxiware will immediately suspend the account and refer the matter to law enforcement without prior notice.
15Third-Party Rights
You acknowledge that your use of the Services may impact third parties. You are solely responsible for ensuring your activities do not infringe, violate, or harm the rights of third parties, including their intellectual property rights, privacy rights, contractual rights, and rights to the peaceful enjoyment of their systems and services.
Proxiware will cooperate with third parties who provide evidence of harm caused by a User's activities conducted through the Services, including by disclosing account information in response to valid legal process or court orders.
16Amendments
Proxiware reserves the right to update this AUP at any time. Changes will be effective upon posting to this page with an updated "Effective Date." Your continued use of the Services following any changes constitutes your acceptance of the updated AUP. We encourage you to review this AUP periodically.
17Contact
For questions about this Acceptable Use Policy or to report potential violations, please contact us: