GHOST NODES –
ACCEPTABLE USE POLICY
Permitted use
Ghost Nodes may be used to operate automation workflows, system integrations, and monitoring services.
Customer is responsible for ensuring that its use of the Service complies with applicable laws.
Prohibited activities
Customer may not use Ghost Nodes to:
- violate applicable laws
- infringe the rights of others
- distribute malware
- perform unauthorized network scanning
- launch denial-of-service attacks
- send spam or phishing Communications
- operate botnets
- conduct cryptocurrency mining
- scrape data in violation of third-party terms
- reverse engineer the Service
- bypass service limits or billing controls
Platform abuse
Customer must not generate artificial traffic or abusive workloads.
Examples include:
- circumventing rate limits
- generating excessive automated traffic
- overloading external systems
- degrading platform performance
Ghost Labs may throttle or suspend workloads that threaten service stability.
High-risk use
Ghost Nodes is not designed for safety-critical environments.
The Service must not be used where failure could result in:
- death or serious bodily injury
- environmental damage
- critical infrastructure failure
Ghost Labs disclaims all liability arising from such use.
Node network usage
Ghost Nodes Components may be deployed within Customer Infrastructure solely for automation, monitoring, and integration purposes.
Customers must not use the Service to create or operate distributed computing networks unrelated to these purposes.
Prohibited Node network activities
Customers must not use Ghost Nodes Components to:
- operate distributed compute clusters
- perform password cracking
- run cryptocurrency mining workloads
- conduct large-scale scraping operations
- perform network attacks
Ghost Labs may restrict, suspend, or terminate workloads that violate these rules.
Platform protection
Ghost Labs may implement safeguards to protect the stability and integrity of the Service, including:
- rate limits
- workload restrictions
- telemetry monitoring
- automated abuse detection
Ghost Labs may also investigate suspected violations of this policy.