Effective Date: 28-01-2026
Astrah OS is an enterprise operating system built for reliability, security, and controlled operations. This Acceptable Use Policy (“AUP”) defines prohibited activity and the boundaries of permissible use.
This AUP applies to all users, customers, and entities accessing or using Astrah OS, including through any connected Third-Party Services (such as WhatsApp providers, Meta/WhatsApp services, email providers, payment gateways, Make.com, and cloud services).
If you violate this AUP, Astrah OS may restrict, suspend, or terminate your access to protect the platform, integrations, and other customers.
Prohibited Activities
Security and System Integrity
You may not:
- Attempt to probe, scan, test, or exploit vulnerabilities of the Service or any related systems without explicit written authorization
- Bypass, disable, interfere with, or compromise authentication, access control, or security features
- Introduce malware, spyware, trojans, worms, or any malicious code
- Attempt unauthorized access to any account, workspace, data, or infrastructure
- Perform denial-of-service (DoS) attacks, abuse rate limits, or overload the system in a way that degrades performance for others
Illegal, Harmful, or Abusive Conduct
You may not use Astrah OS to:
- Facilitate unlawful activity, fraud, deception, or violations of applicable laws or regulations
- Transmit, store, or distribute content that is unlawful, threatening, or promotes violence
- Infringe intellectual property rights or misuse confidential information
- Conduct phishing, credential harvesting, impersonation, or social engineering
Messaging and Communications Abuse (WhatsApp / Email Shield)
Because Astrah OS supports business communication, strict rules apply.
You may not:
- Send spam, bulk unsolicited messages, or run mass outreach in violation of applicable laws or platform rules
- Use Astrah OS to evade consent, opt-out requirements, or messaging restrictions
- Use Astrah OS in a way that risks bans, restrictions, or enforcement actions by third-party communication platforms
You must comply with the policies and terms of all connected communication services, including (without limitation):
- WhatsApp Business Policy
- Meta Commercial Terms
- Google API Services User Data Policy (where applicable)
If your behavior risks platform bans or harms deliverability, Astrah OS may immediately restrict messaging features, suspend your workspace, or terminate access.
Misuse of AI Features
Astrah OS may include AI features that generate drafts, summaries, recommendations, or other outputs.
You may not:
- Use AI outputs to impersonate individuals or misrepresent identity or authority
- Rely on AI outputs for regulated advice (legal, medical, financial) without qualified human review
- Attempt to bypass safeguards or intentionally prompt the system to produce unlawful content
- Upload or process sensitive personal data where you lack legal basis or required consents
You remain responsible for reviewing outputs and ensuring lawful and appropriate use.
Resource Abuse and Non-Intended Use
You may not:
- Use Astrah OS for cryptocurrency mining, automated compute harvesting, or unrelated high-load processing
- Abuse automation, scraping, or repeated requests in a way that materially increases system load or costs beyond normal business use
- Use the Service as general-purpose storage unrelated to the intended business operating system functions
Competitive Use and Reverse Engineering
You may not:
- Reverse engineer, decompile, disassemble, or attempt to derive source code (except where prohibited by law)
- Copy, modify, or create derivative works of Astrah OS without permission
- Remove proprietary notices or labels
- Use the Service to build or benchmark a competing product in a way that violates Astrah OS intellectual property rights
Enforcement
Astrah OS may monitor system health, security signals, logs, and usage patterns to detect abuse and protect reliability.
If we detect violations, we may:
- Issue a warning to the account administrator
- Restrict specific features (including messaging)
- Suspend the workspace or account
- Terminate access immediately for severe or repeated violations
- Report illegal activity to appropriate authorities where required or appropriate
Enforcement actions may be taken without prior notice if needed to protect the Service, third-party integrations, or other customers.
Reporting Security Issues and Violations
If you identify a security vulnerability or potential violation, report it promptly to:
We support responsible disclosure and aim to act quickly to maintain a secure and reliable environment.