ACCEPTABLE USE POLICY ​
Last updated: July 11th 2025
1. Preamble ​
This acceptable use policy (the "AUP") describes the principles that govern your use of our Software (as such term is defined in the Terms and Conditions available at https://scrapoxy.io/legal/terms-and-conditions). Capitalized terms that are defined in the Terms and Conditions have the same meaning in this AUP. The provisions of this AUP apply in full to all Users of the Software.
The AUP is a legally binding agreement between the User and CoreDump Engineering SAS, a company registered before the Company House of Paris under number 943070755 ("CoreDump Engineering" or "we" or "us").
If you are accessing or using the Software on behalf of an entity (such as your employer), you warrant that you are authorized to agree to this AUP on behalf of that entity and that the entity agrees to be responsible for your use of the Software. In that case, "you" and "your" will also refer to that entity.
2. Your Obligations ​
When using the Software, you agree to:
- Comply with all applicable laws and regulations;
- Comply with the AUP and the Agreement;
- Fully indemnify us against claims raised by third parties in connection with your use of the Software;
- Access and use the Software in accordance with the Documentation;
- Ensure that proxies that you deploy and/or manage when using the Software comply with the applicable websites' terms of service, policy, and regulations;
- Obtain any licenses, permits, and other permissions necessary for the proxy deployment you aim to achieve with our Software.
3. Prohibited Activities ​
You must not use the Software to:
Access / use of unauthorized materials ​
The Software shall not be used to access, collect, transmit, distribute, or store any material in violation of any applicable law such as material:
- Protected by any intellectual property right including but not limited to copyright, trademark, trade secret without proper prior authorization; and
- Obscene, defamatory, and/or that is an illegal threat of violates export control laws.
In short, User is solely responsible for all material they input, upload, disseminate, transmit, create, or publish through or though the Software and for obtaining prior legal authorization regarding any material and/or work included within the abovementioned.
Unauthorized message activity ​
Software shall not be used to:
- Send unsolicited messages in bulk or not, commercial or not, in violation of the applicable laws and regulations (“Spam”) such as sending Spam solicitations, Spam from other service providers, collection of replies to Spam sent from other services providers.
- Run unconfirmed mailing lists and/or telephone number lists (“Distribution Lists”) such as subscribing email addresses or telephone numbers to any messaging list without the permission of the email address and/or the telephone number owner but also storing any email addresses or telephone numbers subscribed. All Distribution Lists run and/or hosted by the Software shall be “confirmed opt-in” therefore verification of the address or telephone number owner’s express consent shall be available for the lifespan of all Distributions Lists. Accordingly, email lists, telephone numbers lists, or any kind of databases acquired from third parties intended for Spam or unconfirmed Distribution Lists are prohibited.
The abovementioned prohibitions apply to messages sent through the Software or sent from any kind of network by User, Subscriber User, Subsidiary User, or any person on User's behalf that directly or indirectly refer the recipient to a site hosted through the Software.
Unethical, exploitative, and malicious activity ​
Software shall not be used:
- For advertising, transmitting, or otherwise making available any software program, product, or service designed to violate the AUP or the acceptable use policy of other service providers such as facilitating the means to send spam and the initiation of network sniffing, pinging, packet spoofing, flooding, mail-bombing, and denial-of-service attacks;
- To access any account or electronic resource where the group or individual attempting to gain access does not own or is not authorized to access the resource (e.g. “hacking”, “cracking”, “phreaking” etc.);
- For the purpose of intentionally or recklessly introducing viruses or malicious code into the Software and systems;
- For purposely engaging in activities designed to harass another group or individual such as denial-of-service attacks, hate-speech, advocacy of racial or ethnic intolerance, and any activity intended to threaten, abuse, infringe upon the rights of, or discriminate against any group or individual.
Forbidden activities also include but are not limited to:
- Obtaining (or attempting to obtain) Software or Services with the intent to avoid payment;
- Using the Software and/or the API to obtain (or attempt to obtain) services from another provider with the intent to avoid payment;
- Unauthorized access, alteration, or destruction (or any attempt thereof) of any information about other Users by any means or device;
- Using the Software and/or the API to interfere with the use of the Software and/or the API and network by other Users or authorized individuals;
- Publishing or transmitting any content of links that incite violence, depict a violent act, depict child pornography, or threaten anyone’s health and safety;
- Any act or omission in violation of consumer protection laws and regulations;
- Any violation of a person’s privacy.
The Software may not be used by any person or entity which is involved with or suspected of involvement in activities or causes relating to illegal gambling; terrorism; narcotics trafficking; arms trafficking or the proliferation, development, design, manufacture, production, stockpiling or use of nuclear, chemical or biological weapons, weapons of mass destruction or missiles; in each case including any affiliation with others whatsoever who support the above such activities or causes.
- Ad fraud or click fraud
- Impersonation or spoofing for fraudulent purposes
- Creating fake accounts or content
- Use of automatic ticket purchasing (ticket-bots)
- Raffles, lottery, or gambling
- Fake engagement (likes, comments, shares, etc.)
- Collection of non-public information (i.e: data behind login)
- Gaming or trading of in-game items/currency
- Use of streaming related domains (videos, music, or images streaming)
- Trading crypto/virtual currency or NFT
- Any Search Engine Optimization (SEO) manipulation (i.e: fake clicks in search engines results)
- Posting on classified, used, and resell sites (such as Craig's list)
- Completion of surveys in return for a benefit or anything of value
- Any attempt to deobfuscate, reverse engineer, modify the software or its architecture, replace parts of the code, or otherwise derive the source code from the compiled code of Scrapoxy
- Any form of activity that is in violation of applicable law or regulations or any third party rights
4. Limitation of content / use ​
Use of the Software may be limited at CoreDump Engineering's sole discretion, particularly to prevent any potential damage or service disruption to any third-party computers or service without being held towards customers for any limits imposed as described herein. CoreDump Engineering may also terminate the Agreement and the access to the Software without prior notice.
CoreDump Engineering is not responsible for any issues or damages caused by the User's usage of Scrapoxy. Users acknowledge and accept that they use the Software at their own risk.
Users can report any misuse or suspicious activity through our contact email contact@scrapoxy.io.
5. Accountability ​
Users are responsible for their own actions and of anyone using the Software for their purpose and/or benefit. This responsibility also covers unauthorized access and use of the Software resulting from User's failure to ensure reasonable control measures of access and use of the Software.
The mere access and use of the Software necessarily imply adherence to this AUP on behalf of anyone using the Software including Users, Subscriber User, as well as their Subsidiary User.
If CoreDump Engineering suspects a breach of the AUP by a User, Subscriber User, their own Subsidiary User, or anyone using the Software on User's purpose and/or benefit, CoreDump Engineering may limit the access and the use of the Software or terminate without prior notice the Agreement with the offending Account or the Account itself, or take any remedial or preventive action CoreDump Engineering deems appropriate. In any case, to the extent permitted by law, no credits such as API Credits will be available for interruptions of Software resulting from any violation of the AUP.
6. Changes ​
CoreDump Engineering reserves the right to change this AUP from time to time and in its sole discretion. Material changes to this AUP will be effective upon posting of the amended AUP to the CoreDump Engineering Website.
7. Miscellaneous ​
The impersonation of CoreDump Engineering, representation of a significant business relationship with CoreDump Engineering, or ownership of any of CoreDump Engineering’s properties, including for fraudulently gaining service, custom, patronage, or user trust are strictly prohibited.
The AUP highlights a non-exclusive list of activities and intent deemed incompatible with the Software and more generally with CoreDump Engineering's activities.
CoreDump Engineering may modify the AUP at any time by publishing a revised version on CoreDump Engineering’s website that will enter in effect at the earliest between:
- Date of use of the Software after the publication of the revised version on CoreDump Engineering’s; or
- In any case, thirty (30) days after the publication of the revised version on CoreDump Engineering’s.