Custovia Inc. · Reqify

Acceptable Use Policy

Document version
1.0.0
Effective date
8 May 2026
Last updated
8 May 2026
Contact
[email protected]

Purpose

Reqify accelerates disciplined business-analysis documentation. Custovia prohibits activities that endanger recipients, degrade shared infrastructure integrity, circumvent billing, or collide with lawful content regulations.

Forbidden content & intents

  • Generating or storing material promoting violence, hatred, exploitation, or illegal coercion.
  • Uploading regulated health information without HIPAA-grade agreements when US healthcare compliance applies.
  • Processing government-classified payloads absent written authorisation and hardware controls.
  • Malware redistribution, ransomware staging, deceptive phishing kits, spyware command channels.
  • Operational guidance for circumventing wage, anti-trust, or securities disclosure duties.

Infrastructure abuse

You may not attempt side-channel probing of Custovia infra, unauthorised load testing exceeding agreed commercial pilots, brute forcing authentication surfaces, forging webhook signatures, spoofing tenancy IDs, chaining multi-account evasion schemes, hoarding orphaned sandboxes intentionally, draining credits through scripted loops outside fair-use expectations, mining cryptocurrency on Reqify VMs, or port-scanning ancillary services surfaced only for legitimate webhook callbacks.

Responsible AI practice

Model outputs constitute aids — never substitute fiduciary, medical, licensed engineering, export-control, or courtroom representation without verification. Custovia forbids deceptive impersonation facilitated by deep synthetic voices or forged credentials inside generated artefacts destined for regulatory filing without human sign-off aligning to your jurisdictional mandates.

Investigations & escalation

Trusted reporters, automated abuse scanners, subpoenas, credible CSAM intel, Stripe fraud scores, anomaly detection dashboards, rotating secret leaks, whistleblowing hotlines administered by Custovia counsel, and cross-cloud threat intel alliances may jointly trigger freezes, lawful preservation headers, narrowly tailored log sampling, reversible account pauses preceding customer communication where safety demands, escalation to supervisory authorities compelled by statutes, forensic snapshot exports for enterprise retainers indemnifying chain-of-custody, Stripe refund routing, mandated regional counsel briefings — enumerated illustratively rather than exclusively.

Appeals

If you believe we mis-flagged benign usage write from your organisation domain describing timestamps, project IDs anonymised hashes, artefacts under dispute, corrective mitigations pledged, supervisory chain, remediation timeline, lawful basis you assert resisting takedown, plus references to contradictory policy language — enabling balanced reinstatement scrutiny without prejudicing imminent harm investigations already lawfully gated.