Acceptable Use

This acceptable use policy covers use of the website, all subdomains of https://www.hatsprotocol.xyz, and any related products and services, including HatsSignerGate Deployer App (collectively, the "Services") provided by Haberdasher Labs, Inc. It’s designed to protect us, our customers, and the general Internet community from unethical, irresponsible, and illegal activity.

This policy was last reviewed on December 20, 2024.

Fair use

We provide our facilities with the assumption your use will be “business as usual”, as per our offer schedule. If your use is considered to be excessive, then additional fees may be charged, or capacity may be restricted.

We are opposed to all forms of abuse, discrimination, rights infringement, and/or any action that harms or disadvantages any group, individual, or resource. We expect our customers and, where applicable, their users (“end-users”) to likewise engage our Services with similar intent.

Customer accountability

We regard our customers as being responsible for their own actions as well as for the actions of anyone using our Services with the customer’s permission. This responsibility also applies to anyone using our Services on an unauthorized basis as a result of the customer’s failure to put in place reasonable security measures.

Prohibited activity

Copyright infringement and access to unauthorized material: Our Services must not be used to transmit, distribute or store any material in violation of any applicable law. This includes but isn’t limited to:

  • any material protected by copyright, trademark, trade secret, or other intellectual property right used without proper authorization, and

  • any material that is obscene, defamatory, constitutes an illegal threat or violates export control laws.

  • The customer is solely responsible for all material they input, upload, disseminate, transmit, create or publish through or on our Services, and for obtaining legal permission to use any works included in such material.

Unethical, exploitative, and malicious activity

Our Services must not be used for the purpose of advertising, transmitting, or otherwise making available any software, program, product, or service designed to violate this acceptable use policy, or the acceptable use policy of other service providers. This includes but isn’t limited to facilitating the means to send spam and the initiation of network sniffing, pinging, packet spoofing, flooding, mail-bombing, and denial-of-service attacks.

Our Services must not be used to access any account or electronic resource where the group or individual attempting to gain access does not own or is not authorized to access the resource (e.g. “hacking”, “cracking”, “phreaking”, etc.).

Our Services must not be used for the purpose of intentionally or recklessly introducing viruses or malicious code into our Services and systems.

Our Services must not be used for purposely engaging in activities designed to harass another group or individual. Our definition of harassment includes but is not limited to denial-of-service attacks, hate-speech, advocacy of racial or ethnic intolerance, and any activity intended to threaten, abuse, infringe upon the rights of, or discriminate against any group or individual.

Other activities considered unethical, exploitative, and malicious include:

  • Using our facilities to interfere with the use of our facilities and network by other customers or authorized individuals;

  • Publishing or transmitting any content of links that incite violence, depict a violent act, depict child pornography, or threaten anyone’s health and safety;

  • Any act or omission in violation of consumer protection laws and regulations;

  • Any violation of a person’s privacy.

  • Our Products may not be used by any person or entity, which is involved with or suspected of involvement in activities or causes relating to illegal gambling; terrorism; narcotics trafficking; arms trafficking or the proliferation, development, design, manufacture, production, stockpiling, or use of nuclear, chemical or biological weapons, weapons of mass destruction, or missiles; in each case including any affiliation with others whatsoever who support the above such activities or causes.

Unauthorized use of Haberdasher Labs property

We prohibit the impersonation of Haberdasher Labs and Hats Protocol, the representation of a significant business relationship with Haberdasher Labs, or ownership of any Haberdasher Labs property (including our Products and brand) for the purpose of fraudulently gaining service, custom, patronage, or user trust.

About this policy

This policy outlines a non-exclusive list of activities and intent we deem unacceptable and incompatible with our brand.

We reserve the right to modify this policy at any time by publishing the revised version on our website. The revised version will be effective from the earlier of:

  • the date the customer uses our Products after we publish the revised version on our website; or

  • 30 days after we publish the revised version on our website.

Last updated