Visual

Acceptable Use Policy

Acceptable Use Policy

Revised: February 01, 2026

Effective date: January 03, 2023

Introduction:

This Acceptable Use Policy (“AUP”) governs use of iClosed’s websites, applications, platform features (including scheduling, embedded forms, routing, iScore, automations), APIs, and related services (collectively, the “Services”). This AUP is incorporated by reference into iClosed’s Terms & Conditions (the “Terms”). Capitalized terms not defined here have the meanings given in the Terms and/or the Data Processing Agreement (“DPA”).


If you do not agree to this AUP, you must not use the Services.

  1. Scope and who must comply

This AUP applies to:

  • The entity that signs up for, purchases, or uses the Services (“Customer”);

  • Any individual authorized by Customer to use the Services (“Authorized Users”); and

  • Any use of the Services made through Customer’s account, workspaces, sub-accounts, integrations, API keys, or embedded assets (forms/links/widgets).

Customer is responsible for ensuring its Authorized Users comply with this AUP.

  1. General rule

You may use the Services only:

  • For lawful business purposes;

  • In compliance with the Terms, the DPA (if applicable), and all applicable laws (including privacy, consumer protection, and communications laws); and

  • In a manner that does not harm iClosed, other customers, end users, or third parties, and does not compromise the security, integrity, or availability of the Services.

  1. Prohibited use

You must not (and must not allow others to) use the Services to:


A. Break the law or facilitate wrongdoing

  • Violate any applicable law or regulation, including data protection, anti-spam/marketing, consumer protection, and telecommunications laws.

  • Engage in fraud, deception, impersonation, or misleading practices.

  • Promote or facilitate illegal products, services, or transactions.


B. Abuse, harass, or harm others

  • Harass, threaten, defame, bully, or otherwise abuse any individual or organization.

  • Promote hate, violence, or discrimination.

  • Exploit or endanger minors, or enable any form of exploitation.


C. Security violations and malicious activity

  • Attempt to gain unauthorized access to any account, data, system, or network.

  • Probe, scan, or test vulnerabilities, bypass access controls, or defeat security mechanisms without written permission.

  • Introduce malware, spyware, ransomware, worms, or any harmful code.

  • Interfere with or disrupt the Services, including via denial-of-service attacks, excessive automation, deliberate error generation, or abusive load.


D. Spam, phishing, and deceptive communications

  • Send or facilitate unsolicited messages or unlawful marketing communications.

  • Conduct phishing, scams, deceptive offers, or attempts to obtain credentials/payment information through the Services.

  • Use purchased, rented, scraped, or unlawfully obtained contact lists where required consents/permissions are not present.

  • Evade opt-out mechanisms, filtering, abuse detection, or provider/carrier policies.


E. Privacy violations and unlawful data processing

  • Collect, use, or share personal data without a valid legal basis and required notices/consents (where applicable).

  • Deploy embedded forms or links in a way that fails to provide required disclosures (e.g., privacy notice links where legally required).

  • Use the Services for covert tracking or unlawful monitoring.


F. Restricted and highly sensitive data (unless expressly permitted)

Unless iClosed has explicitly agreed in writing (e.g., via Order Form, DPA, or written approval) and you have implemented appropriate safeguards and complied with applicable law, you must not upload, submit, or process through the Services:

  • Special Categories of Personal Data (GDPR) and similar sensitive categories under applicable law (e.g., health data; genetic data; biometric data used for unique identification; data revealing racial or ethnic origin; religious or philosophical beliefs; trade union membership; sex life or sexual orientation).

  • Sensitive Personal Information and equivalents under applicable law (e.g., precise geolocation; government identifiers; account log-in credentials combined with security codes; contents of communications where restricted).

  • Regulated datasets such as HIPAA/health “PHI,” GLBA/NPI, PCI “cardholder data” (including PAN, CVV, track data), student education records (FERPA), or criminal justice data (CJIS), unless expressly approved in writing.

  • Government-issued identifiers (e.g., SSN, national ID, passport, driver’s license) except where strictly necessary and lawful, and only with appropriate protections.

Customer is responsible for configuring the Services and its internal processes to minimize collection and to restrict access on a least-privilege basis.


G. Misuse of iScore or decisioning-related features

You must not use iScore (or any scoring, enrichment, or similar feature) in a way that:

  • Violates applicable consumer protection, privacy, or credit/eligibility laws; or

  • Makes legally binding or similarly significant decisions about individuals (e.g., employment, housing, insurance, credit) without having a lawful basis/permissible purpose and providing all notices, rights mechanisms, and dispute processes required by law.

  • Treat iScore/scoring outputs as informational only. Do not use them as the sole basis for decisions that produce legal or similarly significant effects on individuals (including where restrictions apply under GDPR Art. 22 or similar laws) without appropriate safeguards, notices, and mechanisms for human review where required.

  • You must not use iScore as a “consumer report” or for consumer eligibility determinations (e.g., credit, employment, housing, insurance) unless you have an independent lawful basis and all required compliance obligations are met.

  • You must not sell, resell, license, distribute, publish, or otherwise make available iScore outputs (including score values/bands, indicators, labels, or derived insights) to any third party as a standalone product, dataset, report, or derivative offering.

  • You must not use iScore outputs for background checks, tenant screening, employment screening, or similar consumer-reporting purposes. If you believe your use case may fall under consumer reporting or eligibility laws (e.g., FCRA or similar), you are solely responsible for ensuring full compliance and obtaining all required notices, authorizations, and providing rights mechanisms.

Customer is solely responsible for determining whether its use case is permitted and compliant.


H. Intellectual property and rights violations

  • Upload or share content you do not have the right to use or authorize iClosed to process.

  • Infringe or misappropriate intellectual property, privacy, publicity, or other rights.

  • Remove or obscure proprietary notices.


I. Reverse engineering, scraping, and competitive misuse

  • Reverse engineer, decompile, or attempt to derive source code or underlying components, except to the extent such restrictions are prohibited by law.

  • Copy, scrape, harvest, or extract data from the Services (including via automated means) except as explicitly permitted by iClosed in writing.

  • Use the Services to benchmark, compete with, or build a competing product using non-public aspects of the Services, except where explicitly permitted in your agreement.


J. Circumvention, account sharing, and misuse of access

  • Share login credentials, sell access, or allow unauthorized access to Customer accounts.

  • Circumvent plan limits, feature gating, technical restrictions, or access controls.

  • Misrepresent identity or affiliation to gain access to restricted features or data.


K. Misuse of integrations and third-party services

  • Use integrations in violation of third-party terms, policies, or applicable law.

  • Route prohibited traffic/content through iClosed to bypass enforcement by email/SMS carriers, providers, or other platforms.


L. Sanctions and export controls

You must not use the Services in violation of applicable trade sanctions or export control laws. The Services may not be used by (or for the benefit of) any person or entity subject to sanctions, or in any embargoed or comprehensively sanctioned jurisdiction, where prohibited by law.

  1. Messaging and communications requirements (if enabled)

If you use any feature that sends communications (directly or via integrations), you must:

  • Send messages only where you have appropriate permission/consent and legal basis as required by applicable law. This includes complying with applicable marketing/communications rules (e.g., anti-spam laws, consent rules for electronic marketing, and carrier/provider policies such as “STOP” handling for SMS where required), which may vary by jurisdiction.

  • Provide required disclosures (including sender identification where required).

  • Provide and honor opt-outs promptly (including “STOP” for SMS where required).

  • Maintain records of consent/permission where required.

  • Not send content that is deceptive, unlawful, abusive, or violates carrier/provider policies.


iClosed may suspend or disable messaging functionality if it detects patterns consistent with spam, phishing, or policy violations.

  1. Platform integrity, reasonable use, and API restrictions

You must not:

  • Run load tests, stress tests, or high-volume automation against the Services without iClosed’s prior written approval.

  • Use bots or scripts in a way that degrades service performance or impacts other customers.

  • Exceed rate limits or attempt to bypass rate limiting, throttling, or abuse controls.

  • Create or facilitate form spam, repeated submission attacks, or automated signups that impact service reliability.

  1. Security and account responsibilities

Customer is responsible for:

  • Maintaining the confidentiality of credentials and API keys;

  • Enforcing strong passwords and enabling MFA where available;

  • Using least-privilege access controls and promptly removing access for departed users;

  • Ensuring systems that connect to the Services are not compromised; and

  • Implementing appropriate safeguards for any data it processes.

  • Notifying iClosed promptly if you suspect compromise of credentials/API keys, unauthorized access, or misuse of your account.

  1. Enforcement

A violation of this AUP is a material breach of the Terms.

To protect the Services, other customers, and the public, iClosed may:

  • Investigate suspected violations;

  • Restrict features (including messaging), rate-limit traffic, or block abusive requests;

  • Remove or restrict access to content that violates this AUP or applicable law; and/or

  • Suspend or terminate access to the Services.


Where feasible, iClosed may provide notice and an opportunity to cure; however, iClosed may act immediately where necessary to address security risk, legal exposure, harm to others, or service integrity.

If you believe an enforcement action was taken in error, you may contact us using the details in Section 8 to request review.

  1. Reporting abuse

To report suspected abuse or security concerns, contact:

Email: hello@iclosed.io

Include relevant details such as workspace/account name, URLs (form/link), timestamps, message samples, and any available logs.

  1. Changes to this AUP

iClosed may update this AUP from time to time. If changes are material, iClosed will provide notice as required by the Terms or applicable law. Continued use of the Services after the effective date of an updated AUP constitutes acceptance of the updated AUP.

10. Contact Information

If you have questions about whether a specific use case is permitted, contact:

Email: hello@iclosed.io