Acceptable Use Policy
Last updated: May 13, 2026
1. Introduction
This Acceptable Use Policy explains the rules that apply when you access or use Melkom Systems websites, software, web-based applications, client portals, dashboards, downloadable tools, support systems, or related services that link to this policy.
Melkom Systems provides custom software development, web-based applications, business management tools, automation solutions, downloadable software, and related technology services for businesses and individuals.
This policy is part of our Terms and Conditions and may also apply together with our Privacy Policy, Cookie Policy, Custom Software and Service Terms, Refund Policy, End User License Agreement, or any separate written agreement between you and Melkom Systems.
By using our website, applications, or services, you agree to follow this Acceptable Use Policy. If you do not agree, you must not use the applicable website, application, or service.
2. Who This Policy Applies To
This policy applies to all users of our website, applications, and services, including clients, visitors, account owners, employees, contractors, administrators, authorized users, trial users, and anyone who accesses systems developed, hosted, supported, or maintained by Melkom Systems.
If you are using a custom application on behalf of a company, organization, or client, you are responsible for following this policy and for making sure your authorized users also follow it.
3. Authorized Use
You may use our website, applications, and services only for lawful, authorized, and intended purposes. You must use them in a way that does not interfere with their operation, security, availability, integrity, or other users’ rights.
You are responsible for all activity that occurs under your account or login credentials. You must keep usernames, passwords, authentication codes, and access credentials confidential.
- Do not share login credentials unless the system or written agreement specifically allows it.
- Do not access another user’s account, data, files, projects, records, or business information without permission.
- Do not attempt to bypass access controls, permissions, security settings, or administrative restrictions.
- Notify Melkom Systems or the applicable account owner promptly if you believe an account, password, or system has been compromised.
4. Prohibited Activities
You may not use our website, applications, software, or services to engage in any prohibited activity, including the following:
- Using the services for unlawful, fraudulent, deceptive, harmful, or unauthorized purposes.
- Violating any applicable law, regulation, court order, contract, third-party right, intellectual property right, privacy right, or confidentiality obligation.
- Uploading, transmitting, or distributing malware, viruses, ransomware, spyware, worms, corrupted files, malicious code, or any harmful technology.
- Attempting to gain unauthorized access to accounts, systems, databases, networks, servers, source code, credentials, or data.
- Scanning, probing, penetration testing, stress testing, vulnerability testing, or security testing any system without prior written permission from Melkom Systems.
- Interfering with, disrupting, overloading, damaging, disabling, or impairing the performance, availability, or security of any website, application, service, network, or system.
- Using bots, scrapers, crawlers, automated scripts, data-mining tools, or similar technology unless expressly authorized in writing.
- Sending spam, phishing messages, unsolicited communications, misleading messages, impersonation attempts, or social-engineering communications.
- Using the services to harass, threaten, abuse, defame, intimidate, discriminate against, exploit, or harm another person or organization.
- Uploading or submitting content that is obscene, defamatory, hateful, violent, exploitative, abusive, sexually explicit, or otherwise objectionable.
- Uploading, storing, or sharing content involving child sexual abuse material, exploitation of minors, or any material that violates laws protecting children.
- Misrepresenting your identity, affiliation, authority, permissions, or relationship with another person, company, organization, or account owner.
- Using the services to collect, process, store, or disclose personal information without the required rights, notices, permissions, or legal basis.
- Using the services for cryptocurrency mining, bot activity, fake traffic generation, click fraud, credential stuffing, or automated account abuse.
- Copying, modifying, adapting, reverse engineering, decompiling, disassembling, or attempting to derive source code except as expressly permitted by law or by written agreement.
- Reselling, sublicensing, renting, leasing, transferring, or providing unauthorized access to any software, application, or service.
- Using the services in a way that could damage Melkom Systems, our clients, users, vendors, service providers, or the reputation or operation of any related system.
5. Client Data and Business Records
Some custom applications built or supported by Melkom Systems may allow clients to enter, upload, manage, or track business information such as jobs, projects, employees, schedules, expenses, receipts, invoices, customer records, addresses, files, photos, notes, and internal business records.
The client or account owner is responsible for the information entered into the application and for deciding who may access it.
- You must have the legal right and proper authorization to enter, upload, view, edit, store, or share any information submitted through a custom application.
- You must not enter false, misleading, unauthorized, confidential, or unlawfully obtained information.
- You are responsible for providing any legally required notices or obtaining any legally required consents from employees, workers, contractors, customers, vendors, or other individuals whose information is entered into an application.
- You must use employee, customer, job, project, expense, or operational data only for legitimate and lawful business purposes.
- You must not use any system to harass, unfairly monitor, discriminate against, retaliate against, or unlawfully profile employees, workers, customers, or other individuals.
6. Sensitive or Regulated Information
Unless Melkom Systems specifically agrees in writing, our standard website, applications, and services are not designed for storing or processing highly sensitive or specially regulated information.
You must not submit, upload, or store the following types of information unless the applicable system and written agreement specifically allow it:
- Protected health information or medical records subject to HIPAA or similar health privacy laws.
- Full payment card numbers, card security codes, or other payment card data outside an approved payment processor.
- Bank account credentials, online banking passwords, or highly sensitive financial access information.
- Government identification numbers, Social Security numbers, passport numbers, or driver’s license numbers unless specifically required and authorized.
- Biometric data, precise geolocation tracking, or other sensitive personal information unless specifically approved in writing.
- Classified, export-controlled, legally restricted, or confidential third-party data that you are not authorized to provide.
If you believe your project requires handling sensitive or regulated information, you must discuss those requirements with Melkom Systems before submitting that information.
7. Uploaded Files, Photos, Documents, and Content
If a website, application, or service allows you to upload or submit files, images, documents, text, comments, notes, or other content, you are responsible for that content.
You represent that you have all rights, permissions, and authority needed to submit the content and allow it to be used as part of the applicable service.
- Do not upload content that infringes copyrights, trademarks, trade secrets, privacy rights, publicity rights, or other third-party rights.
- Do not upload content that contains malware, harmful code, or security risks.
- Do not upload content that is unlawful, abusive, defamatory, threatening, exploitative, or discriminatory.
- Do not upload confidential information belonging to another person or organization unless you are authorized to do so.
- Do not upload personal information unless it is necessary for a legitimate business purpose and you have the right to provide it.
8. Security and System Integrity
You must not attempt to compromise, test, bypass, or interfere with the security or integrity of any Melkom Systems website, application, service, server, database, account, or network unless we have given you prior written permission.
Unauthorized security testing, penetration testing, vulnerability scanning, password guessing, credential stuffing, scraping, denial-of-service activity, or similar activity is prohibited.
9. Third-Party Services
Our website, applications, or services may connect with or rely on third-party services such as hosting providers, cloud platforms, payment processors, analytics tools, email providers, authentication services, APIs, or business software.
You must comply with all applicable third-party terms, policies, and laws when using connected third-party services. Melkom Systems is not responsible for misuse of third-party platforms or services by clients, users, or account owners.
10. Downloadable Software and Tools
If Melkom Systems provides downloadable software, installers, desktop tools, utilities, or other programs, you may use them only as allowed by the applicable agreement, license, documentation, or End User License Agreement.
Unless expressly permitted in writing, you may not copy, redistribute, resell, modify, reverse engineer, decompile, disassemble, remove license controls from, or create unauthorized derivative works based on downloadable software provided by Melkom Systems.
11. No Harmful Business Use
You may not use our services in a way that creates an unreasonable risk of harm to people, property, businesses, operations, systems, data, or legal rights.
You are responsible for verifying that any software, workflow, dashboard, automation, report, or business tool is appropriate for your intended use before relying on it for business decisions, employee management, customer communications, billing, scheduling, project management, or operations.
12. Monitoring and Enforcement
Melkom Systems may, but is not required to, monitor use of our website, applications, and services for security, performance, compliance, support, and operational purposes.
If we believe this policy has been violated, we may take action, including:
- Issuing a warning.
- Removing or disabling access to content, files, data, or features.
- Suspending or terminating user accounts or access credentials.
- Restricting, throttling, blocking, or disabling access to websites, applications, or services.
- Investigating suspected misuse, fraud, abuse, or security incidents.
- Notifying the applicable client, account owner, service provider, regulator, or law enforcement authority when appropriate.
- Taking legal action or seeking damages where permitted by law.
We are not liable for any action we take in response to an actual or suspected violation of this policy.
13. Reporting Violations
If you believe someone is violating this Acceptable Use Policy or misusing a Melkom Systems website, application, or service, please contact us and provide as much detail as reasonably possible.
Email: hello@melkomsystems.com
14. Changes to This Policy
We may update this Acceptable Use Policy from time to time. When we update it, we will revise the “Last updated†date at the top of this page.
Your continued use of our website, applications, or services after an updated policy is posted means you accept the updated version.
15. Contact Us
If you have questions about this Acceptable Use Policy, please contact us at:
Melkom Systems
California, United States
Email: hello@melkomsystems.com
Website: https://melkomsystems.com
