Acceptable use policy

Acceptable use for DeTrustPay

This policy defines prohibited behavior, expected conduct, and enforcement boundaries for DeTrustPay users. Platform enforcement cannot reverse finalized on-chain outcomes.

Last updated: 2026-02-08Terms of serviceRisk disclosure
Policy scope

What this governs

This policy applies to use of DeTrustPay web services and operational channels.

  • Web app accounts and sessions.
  • Public APIs, indexer-backed data, and notification tooling.
  • Support and policy contact channels.
Boundary conditions

What this does not govern

Some outcomes are controlled by blockchain finality rather than platform moderation.

  • Non-custodial wallet ownership and private key management.
  • Reversal of finalized on-chain transactions.
  • Subjective legal adjudication of off-chain delivery disputes.
Prohibited use

Behavior that is not allowed

The following categories can lead to warning, suspension, or permanent termination.

Prohibited

Financial crime and sanctions violations

Illegal value transfer activity is not allowed.

  • Fraud, money laundering, terrorist financing, or knowingly facilitating these acts.
  • Sanctions evasion or routing activity through prohibited jurisdictions.
  • Use of DeTrustPay to conceal source of funds or beneficial ownership.
Prohibited

Counterparty deception

Misrepresentation of fulfillment or transaction intent is prohibited.

  • Fabricating delivery status, evidence, or off-chain proof.
  • Knowingly listing false service terms or fake collateral expectations.
  • Using intimidation or deception to force confirmation actions.
Prohibited

Protocol and incentive manipulation

Abuse of settlement mechanics is prohibited.

  • Coordinated griefing behavior intended to stall fair settlement.
  • Abuse patterns designed to exploit incentive asymmetries.
  • Any attempt to bypass deterministic state transitions.
Prohibited

Platform abuse and security attacks

Do not harm service availability or user safety.

  • Credential stuffing, phishing, malware delivery, or social engineering.
  • Unauthorized scraping, API abuse, or denial-of-service behavior.
  • Attempts to bypass authentication, authorization, or rate limits.
DeFi examples

Examples of unacceptable behavior

Concrete cases that violate this policy in DeTrustPay-specific workflows.

Behavior

Submitting fabricated fulfillment evidence to pressure counterparty confirmation.

Why prohibited

Undermines trust and creates unfair settlement pressure.

Behavior

Creating coordinated transactions to exploit incentive timing behavior.

Why prohibited

Manipulates protocol intent and harms market integrity.

Behavior

Using the support channel to impersonate another wallet owner.

Why prohibited

Creates account takeover risk and operational abuse.

Behavior

Automating repeated high-frequency requests to degrade public service reliability.

Why prohibited

Impacts availability and harms legitimate users.

Enforcement

How policy enforcement works

Actions are proportional to severity, recurrence, and risk impact.

  • Issue warnings and request corrective action.
  • Temporarily rate-limit, suspend, or disable account access.
  • Permanently terminate access in severe or repeated cases.
  • Preserve records and report activity where required by applicable law.
Finality reminderEnforcement occurs at the application level and does not alter on-chain data or reverse finalized on-chain settlements.
Expected conduct

Allowed and encouraged behavior

These practices improve safety and fairness for both counterparties.

  • Define objective transaction terms and fulfillment criteria.
  • Submit truthful evidence and respond to counterparties in good faith.
  • Use proposal paths to reduce expected loss instead of forcing deadlock.
  • Protect credentials, verify wallet actions, and report abuse promptly.
Questions or reports

Report abuse or get clarification

Start with self-service guidance. If still blocked, contact support with a clear incident summary.

Related documents