GHOST NODES –
ACCEPTABLE USE POLICY

Permitted use

Ghost Nodes may be used to operate automation workflows, system integrations, and monitoring services.

Customer is responsible for ensuring that its use of the Service complies with applicable laws.

Prohibited activities

Customer may not use Ghost Nodes to:

  • violate applicable laws
  • infringe the rights of others
  • distribute malware
  • perform unauthorized network scanning
  • launch denial-of-service attacks
  • send spam or phishing Communications
  • operate botnets
  • conduct cryptocurrency mining
  • scrape data in violation of third-party terms
  • reverse engineer the Service
  • bypass service limits or billing controls

Platform abuse

Customer must not generate artificial traffic or abusive workloads.

Examples include:

  • circumventing rate limits
  • generating excessive automated traffic
  • overloading external systems
  • degrading platform performance

Ghost Labs may throttle or suspend workloads that threaten service stability.

High-risk use

Ghost Nodes is not designed for safety-critical environments.

The Service must not be used where failure could result in:

  • death or serious bodily injury
  • environmental damage
  • critical infrastructure failure

Ghost Labs disclaims all liability arising from such use.

Node network usage

Ghost Nodes Components may be deployed within Customer Infrastructure solely for automation, monitoring, and integration purposes.

Customers must not use the Service to create or operate distributed computing networks unrelated to these purposes.

Prohibited Node network activities

Customers must not use Ghost Nodes Components to:

  • operate distributed compute clusters
  • perform password cracking
  • run cryptocurrency mining workloads
  • conduct large-scale scraping operations
  • perform network attacks

Ghost Labs may restrict, suspend, or terminate workloads that violate these rules.

Platform protection

Ghost Labs may implement safeguards to protect the stability and integrity of the Service, including:

  • rate limits
  • workload restrictions
  • telemetry monitoring
  • automated abuse detection

Ghost Labs may also investigate suspected violations of this policy.