Acira AI Logo
PricingFeaturesAboutCompare
Login

Acceptable Use Policy

ACCEPTABLE USE POLICY

Last updated: March 19, 2026


This Acceptable Use Policy ("AUP") governs your use of the services provided by Acira AI LLC ("Company," "we," "us," "our"). This AUP is incorporated into and forms part of our Terms and Conditions (the "Legal Terms"). Capitalized terms not defined in this AUP have the meanings given to them in the Legal Terms.

By using the Services, you agree to comply with this AUP. We may update this AUP from time to time by posting a revised version at https://www.acira.ai/acceptable-use. Updates to resource limits, thresholds, and operational rules take effect upon posting. If an update materially restricts activities that were previously permitted, we will provide reasonable advance notice before the change takes effect. Your continued use of the Services after any changes constitutes your acceptance of the updated AUP. If you do not agree with this AUP, you must stop using the Services.

This AUP may be translated into other languages for your convenience. In the event of any conflict or inconsistency between the English version and any translated version, the English version shall prevail.


TABLE OF CONTENTS

  1. RESOURCE USAGE AND FAIR USE
  2. PROHIBITED TECHNICAL BEHAVIORS
  3. CONTENT STANDARDS
  4. ENFORCEMENT
  5. REPORTING VIOLATIONS
  6. CONTACT US

1. RESOURCE USAGE AND FAIR USE

The Services, including website hosting, are provided on shared infrastructure. To ensure a quality experience for all users, the following fair use limits apply:

Bandwidth

While we do not impose fixed bandwidth caps, all usage is subject to fair and reasonable use. We consider bandwidth usage to be unreasonable if it:

  • Consistently exceeds what is typical for a website of similar size, complexity, and traffic volume hosted on the Services;
  • Is primarily driven by automated, non-human traffic that is not organic search engine crawling;
  • Results from the use of the Services as a content delivery network (CDN), file hosting service, media streaming platform, or proxy/relay service, rather than as a website hosting platform;
  • Places a disproportionate burden on our infrastructure relative to your plan and usage pattern.

If we determine that your bandwidth usage is unreasonable, we will notify you and provide a reasonable opportunity to reduce your usage before taking enforcement action, unless immediate action is required to protect the integrity of the Services.

Compute and Processing

  • Custom code execution (page handlers, scheduled tasks, webhooks) must not consume excessive CPU, memory, or network resources.
  • Scheduled tasks must not run at intervals more frequent than permitted by your plan.
  • Individual request handlers must complete within the time limits established for your plan.
  • Cryptocurrency mining, password cracking, or other computationally intensive activities unrelated to your website's purpose are prohibited.

Storage

  • Storage usage must remain within the limits of your plan as described on our pricing page.
  • You may not use the Services primarily as a file storage, backup, or archival service.
  • Files uploaded to the Services should be directly related to your website's content and functionality.

Email

  • Outgoing email (including transactional emails and form submission notifications) is subject to the daily sending limits of your plan.
  • Email must comply with the CAN-SPAM Act and all other applicable anti-spam laws.
  • You must not send unsolicited commercial email, bulk email, or spam through the Services.
  • If your email activity generates bounce rates above 5% or spam complaint rates above 0.1%, you will receive a warning notification. If bounce rates exceed 10% or complaint rates exceed 0.5%, your email sending will be automatically paused until the issue is resolved.

2. PROHIBITED TECHNICAL BEHAVIORS

In addition to the prohibited activities described in the Legal Terms, you must not:

Network and Infrastructure Abuse

  • Use the Services to conduct or facilitate denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks against any target.
  • Use the Services as an open proxy, open relay, or anonymization service.
  • Attempt to probe, scan, or test the vulnerability of our systems or networks, or to breach any security or authentication measures, unless you have received our prior written permission for authorized security testing.
  • Interfere with or disrupt the integrity or performance of the Services or the data contained therein.
  • Attempt to gain unauthorized access to any systems, networks, or accounts connected to the Services.

Outbound Connections

  • Webhooks, outbound API calls, and scheduled tasks must not be used to relay spam, conduct scraping of third-party services in violation of their terms, or perform any activity that could harm external systems.
  • Outbound HTTP requests from custom code are subject to rate limits determined by your plan.
  • You must not use the Services to circumvent rate limits or access controls imposed by third-party services.

Code and Content Manipulation

  • You must not use custom code execution features to circumvent plan limitations (such as edit limits, page limits, or storage limits).
  • You must not inject client-side tracking scripts, advertising networks, or third-party data collection mechanisms that are not disclosed in your website's privacy policy.
  • You must not modify, tamper with, or reverse-engineer any platform-generated code, security measures, or bot protection mechanisms.
  • You must not deploy code designed to exploit vulnerabilities in visitors' browsers or devices.

Automated Access

  • Automated access to the Services (via API, scripts, bots, or other means) must use the provided APIs and must comply with any rate limits.
  • Scraping, crawling, or systematically downloading content from the Services or from other websites hosted on the Services is prohibited unless you are the owner of the content being accessed.
  • You must not use automation to create accounts, generate content, or perform actions at scale in a manner that strains our infrastructure or violates the Legal Terms.

3. CONTENT STANDARDS

All content hosted on or transmitted through the Services must comply with the content policies set forth in the Legal Terms, including the Prohibited Activities section. In addition:

Prohibited Content

You must not host, publish, or distribute content that:

  • Contains malware, viruses, ransomware, spyware, or other malicious code;
  • Implements phishing pages, fake login forms, or deceptive credential-harvesting mechanisms;
  • Facilitates scams, fraud, or deceptive commercial practices;
  • Promotes or facilitates terrorism or violent extremism;
  • Contains child sexual abuse material (CSAM) or exploits minors in any way;
  • Infringes upon the intellectual property rights of others;
  • Violates the privacy or publicity rights of others; or
  • Is otherwise illegal in the jurisdictions where it is accessible.

Domain and Brand Abuse

  • You must not register or use domain names through the Services for the purpose of cybersquatting, typosquatting, or impersonating other brands, organizations, or individuals.
  • You must not use the Services to create websites that impersonate or are confusingly similar to other businesses, government agencies, or public figures for fraudulent or misleading purposes.

4. ENFORCEMENT

Investigation

We reserve the right to investigate any suspected violation of this AUP. During an investigation, we may:

  • Review your website content, configurations, and usage patterns;
  • Analyze traffic patterns and resource consumption;
  • Examine outbound network activity and API call patterns; and
  • Request information from you regarding your use of the Services.

Enforcement Actions

If we determine that you have violated this AUP, we may, in our sole discretion and without prior notice (unless otherwise specified), take one or more of the following actions:

  1. Warning: Issue a written warning specifying the violation and requiring corrective action within a reasonable timeframe.
  2. Throttling: Reduce the resources available to your website or account (such as bandwidth, compute, or email sending) to prevent ongoing harm to the Services.
  3. Content Removal: Remove or disable access to specific content that violates this AUP.
  4. Feature Restriction: Disable specific features or capabilities of your account (such as custom code execution, scheduled tasks, or outbound webhooks).
  5. Website Suspension: Take your website offline temporarily while the violation is investigated or remediated.
  6. Account Termination: Permanently terminate your account and delete all associated data in accordance with the Legal Terms.
  7. Legal Action: Pursue civil or criminal remedies as appropriate, and report violations to law enforcement authorities.

Repeat Violations

Repeated or egregious violations of this AUP may result in immediate account termination without prior warning.

Appeals

If you believe that an enforcement action was taken against you in error, you may appeal by contacting us at legal@acira.ai within fourteen (14) days of the enforcement action. We will review your appeal and respond within a reasonable timeframe. Appeals do not automatically suspend enforcement actions.


5. REPORTING VIOLATIONS

If you become aware of any use of the Services that violates this AUP, please report it to us at legal@acira.ai. Your report should include:

  • A description of the violation;
  • The URL or location of the violating content or behavior;
  • Any supporting evidence; and
  • Your contact information.

We will investigate all credible reports and take appropriate action.


6. CONTACT US

If you have questions about this Acceptable Use Policy, please contact us at:

Acira AI LLC
11500 S Eastern Ave, Suite 150
Henderson, NV 89052
United States

Phone: 888-389-1189
Email: legal@acira.ai

Your Privacy, Our Priority

We don't sell your data, we don't use tracking cookies — that's why you won't see a cookie banner here. We honor Global Privacy Control, and for EU customers, visitor data is stored and processed exclusively within the European Union.

See how we protect your data
GDPR Art 27 representationUK-GDPR Art 27 representationDSA representation
Acira AI

Build beautiful websites with AI. No coding required.

Proudly built in the United States

Company
PricingFeaturesAboutCompareTrust & Privacy
Legal
Privacy PolicyTerms & ConditionsAcceptable UseData ProcessingTransfer Impact

© 2026 Acira AI LLC. All rights reserved.