FosterFlow Acceptable Use Policy

Effective Date: April 2, 2026

This Acceptable Use Policy (“Policy”) sets the minimum standards for using FosterFlow’s Services. Because FosterFlow operates in a multi-tenant environment, misuse by one customer can negatively impact recipients, mailbox providers, and other customers.

1. Purpose and Scope

FosterFlow provides infrastructure and tools to help customers send lawful, consent-based communications. This Policy applies to all websites, applications, APIs, sending features, and integrations provided by Foster Flow Limited.

Customer is responsible for all activity under its account, including actions by employees, contractors, and integrated third-party platforms.

2. Customer Responsibility

  • Content & Data: Customer is solely responsible for all content, recipient data, sender identities, and campaign links used within the Services.

  • Consent: Customer must ensure all required notices and legal consents are obtained and maintained before messaging any recipient.

  • Account Security: Customer must maintain accurate identity information and secure all API keys, passwords, and tokens.

3. Prohibited Conduct

Users are strictly prohibited from using FosterFlow for:

  • Illegal Activity: Engaging in fraudulent, deceptive, or infringing conduct, or violating any privacy or anti-spam laws.

  • Spam: Sending unsolicited bulk communications or campaigns that generate excessive complaints or blocks.

  • Unlawful Data: Using recipient data that was purchased, rented, scraped, harvested, or acquired without a valid legal right.

  • Harmful Code: Distributing malware, viruses, ransomware, or code designed to disrupt or gain unauthorized access to systems.

  • Phishing & Impersonation: Sending messages designed to trick recipients into disclosing sensitive information or impersonating other entities.

  • Security Attacks: Attempting to scan, probe, or bypass the security and authentication measures of FosterFlow or any third-party system.

  • Platform Abuse: Overloading or interfering with FosterFlow’s infrastructure through rate-limit evasion or “queue flooding.”

4. Consent and Sending Practices

4.1 Required Standards

  1. Legal Basis: Send only where valid consent or legal basis exists under applicable law.

  2. Identification: Accurately identify the sender and the business entity.

  3. Opt-Out: Provide and honor clear unsubscribe and opt-out mechanisms promptly.

  4. List Hygiene: Remove invalid, bouncing, or blocked contacts regularly.

  5. Transparency: Avoid deceptive subject lines, “From” names, or misleading tracking practices.

4.2 List Restrictions

  • No Third-Party Lists: You may not use purchased, brokered, or rented email lists.

  • No Suppression Bypass: You may not re-import recipients who have previously unsubscribed or complained.

5. Domain and Authentication Controls

  • Authorized Domains: Customer may only use domains and brands they own or are authorized to use.

  • Technical Controls: FosterFlow may require the implementation of SPF, DKIM, and DMARC as a condition of sending. Failure to maintain these records may result in service restriction.

6. Technical and API Use

  • Usage Limits: Customer may not exceed or circumvent rate limits, quotas, or billing measurements.

  • Transparency: Customer may not hide the source or destination of traffic generated through the Services.

  • Credential Rotation: Credentials must be rotated immediately if a compromise is suspected.

7. Monitoring and Enforcement

7.1 Operational Review

FosterFlow reserves the right to monitor operational telemetry, including complaint rates, bounce rates, and traffic patterns, to ensure ecosystem health. We may request documentation regarding your list source or consent records; failure to cooperate is grounds for suspension.

7.2 Enforcement Actions

If a violation occurs, FosterFlow may:

  • Issue warnings or require corrective remediation.

  • Quarantine, reject, or delay specific campaigns.

  • Throttle, suspend, or terminate access to the Services.

  • Disclose information to authorities where necessary to investigate abuse or comply with legal obligations.

7.3 Immediate Suspension

FosterFlow may immediately block or terminate an account without prior notice if we believe the account is involved in phishing, malware distribution, or any activity that poses an urgent risk to our reputation or infrastructure.

8. Remediation

To reinstate a suspended account, Customer must:

  1. Cease all offending activity immediately.

  2. Provide requested records or evidence of consent.

  3. Secure compromised systems and rotate all credentials.

  4. Demonstrate to FosterFlow’s satisfaction that the issue is resolved.

9. Reporting and Contact

If you become aware of any abuse, phishing, or security violations involving our Services, please report them immediately:

  • Abuse/Policy Contact: wusu@fosterflow.ai

  • Security Contact: support@fosterflow.ai

10. Policy Changes

FosterFlow may update this Policy from time to time. Continued use of the Services after an update constitutes acceptance of the new terms.

Foster Flow Limited: UNIT NO.06J7 ON 11 FLOOR WELLBORNE COMMERCIAL CENTRE NO.8 JAVA ROAD HONG KONG

 

FosterFlow Footer | Smart Automation