ACCEPTABLE USE POLICY
Last Updated: April 1, 2026
Leads Monkey Ltd
692/D, near 3 No Stop, Neelam Block, Iqbal Town
Lahore, Pakistan
Email: info@leadsmonky.com
Website: https://leadsmonky.com
1. PURPOSE AND SCOPE
This Acceptable Use Policy (“AUP”) defines prohibited uses of Leads Monky services, including Google Workspace reseller services and cold email infrastructure setup. This policy protects Leads Monky, our customers, Google, and the broader internet community from abusive, illegal, or harmful activities.
This AUP applies to:
- All Leads Monky customers and users
- All Google Workspace accounts provisioned through Leads Monky
- All email infrastructure and domain configurations we manage
- All use of our support services and platforms
BY USING LEADS MONKY SERVICES, YOU AGREE TO COMPLY WITH THIS POLICY.
Violations may result in:
- Immediate account suspension
- Permanent termination without refund
- Reporting to law enforcement
- Legal action for damages
- Blacklisting from future service
2. PROHIBITED ACTIVITIES
2.1 Illegal Activities
You MAY NOT use our services for any illegal purpose, including but not limited to:
Criminal Activity:
- Any activity that violates local, national, or international law
- Drug trafficking or illegal substance distribution
- Money laundering or terrorist financing
- Human trafficking or exploitation
- Sale of illegal weapons or explosives
- Counterfeiting or forgery
- Identity theft or impersonation for fraud
- Unauthorized access to computer systems (hacking)
Intellectual Property Violations:
- Copyright infringement (pirated software, movies, music)
- Trademark infringement
- Patent violations
- Trade secret theft
- Distribution of counterfeit goods
- Unauthorized use of licensed materials
Fraud and Financial Crimes:
- Ponzi schemes or pyramid schemes
- Investment fraud or securities manipulation
- Credit card fraud or payment fraud
- Tax evasion schemes
- Advance fee fraud (419 scams)
- Cryptocurrency pump-and-dump schemes
- Fake invoice scams
2.2 Spam and Unsolicited Email
STRICT ANTI-SPAM POLICY:
Prohibited Email Practices:
- Sending unsolicited bulk email (spam)
- Email lists purchased or scraped without consent
- Sending to recipients who have not opted in
- Ignoring unsubscribe requests
- Harvesting email addresses from websites
- Dictionary attacks or address list generation
- Email flooding or mail bombing
- Spoofing sender addresses to hide identity
Legal Compliance Required:
All email sending must comply with:
- CAN-SPAM Act (USA): Opt-out mechanism, accurate headers, physical address
- CASL (Canada): Express or implied consent, identification, unsubscribe mechanism
- GDPR (EU): Lawful basis for processing, consent where required
- ePrivacy Directive: Consent for marketing emails
- Australia Spam Act 2003: Consent and unsubscribe requirements
Cold Email Best Practices (Required):
- ✓ Legitimate business purpose (B2B sales, networking)
- ✓ Researched, targeted recipient lists
- ✓ Personalized messages (not generic templates to thousands)
- ✓ Clear sender identification
- ✓ Working unsubscribe mechanism
- ✓ Respect opt-out requests immediately
- ✓ Business physical address included
- ✓ Accurate subject lines (no deception)
- ✓ Reasonable sending volumes (not mass spam)
Prohibited Cold Email Practices:
- ✗ Scraping contact info without consent
- ✗ Buying email lists from third parties
- ✗ Mass generic emails to thousands
- ✗ Misleading subject lines or from names
- ✗ No unsubscribe link
- ✗ Continuing after unsubscribe request
- ✗ Impersonating others or companies
- ✗ Using disposable domains to evade blocks
Spam Complaint Thresholds:
- 0.1% complaint rate: Warning and monitoring
- 0.3% complaint rate: Suspension pending review
- 0.5% complaint rate: Immediate termination
2.3 Phishing, Malware, and Security Threats
Prohibited Security-Related Activities:
Phishing:
- Impersonating banks, payment processors, or trusted entities
- Fake login pages or credential harvesting
- Social engineering attacks
- CEO fraud or business email compromise (BEC)
- Fake invoice or payment redirect scams
Malware Distribution:
- Viruses, trojans, or worms
- Ransomware
- Spyware or keyloggers
- Cryptominers
- Botnet command-and-control
- Malicious scripts or exploits
Hacking and Unauthorized Access:
- Attempting to breach security systems
- Port scanning or vulnerability scanning without authorization
- Distributed Denial of Service (DDoS) attacks
- Exploiting software vulnerabilities
- Brute force password attacks
- SQL injection or other code injection attacks
Network Abuse:
- IP spoofing or packet manipulation
- Sending excessive traffic to overwhelm systems
- Interfering with other users’ service
- Circumventing authentication or access controls
2.4 Harmful Content
Prohibited Content Types:
Child Exploitation Material:
- Any content depicting minors in sexual contexts (ZERO TOLERANCE)
- Child sexual abuse material (CSAM)
- Grooming or solicitation of minors
- Violations reported immediately to National Center for Missing & Exploited Children (NCMEC) and law enforcement
Adult/Sexual Content:
- Pornography or sexually explicit material
- Escort services or sexual services
- Adult content sent to non-consenting recipients
- Sex trafficking or exploitation
Violence and Threats:
- Threats of physical violence or harm
- Promotion of terrorism or violent extremism
- Instructions for making weapons or explosives
- Glorification of violence or mass shootings
- Assassination markets or hitman services
Hate Speech and Discrimination:
- Content promoting hatred based on race, ethnicity, religion, gender, sexual orientation, disability
- Nazi or white supremacist propaganda
- Genocidal content or calls for ethnic cleansing
- Harassment or bullying campaigns
- Doxxing (publishing private information to incite harassment)
Self-Harm Content:
- Promotion of suicide or self-injury
- Pro-anorexia or pro-bulimia content
- Instructions for dangerous challenges or activities
2.5 Deceptive Practices
Prohibited Deceptive Activities:
Scams and Fraud:
- Get-rich-quick schemes
- Work-from-home scams
- Fake job offers or employment fraud
- Romance scams or catfishing
- Tech support scams
- Fake charity or disaster relief scams
- Lottery or prize scams
False Advertising:
- Misleading product claims
- Fake reviews or testimonials
- Counterfeit goods
- Multi-level marketing (MLM) schemes violating laws
- Unsubstantiated health claims
Impersonation:
- Pretending to be another person or company
- Fake government or authority impersonation
- Brand impersonation
- Celebrity or influencer impersonation
2.6 Regulated Industries (Special Requirements)
High-Risk Industries Requiring Pre-Approval:
Healthcare and Pharmaceuticals:
- Prescription drug sales (illegal without proper licensing)
- Medical devices requiring FDA approval
- Controlled substances
- Telemedicine without proper credentials
- Health claims violating FDA/FTC regulations
Financial Services:
- Unlicensed investment advice
- Forex or cryptocurrency trading platforms (requires licensing)
- Payday loans or high-interest lending
- Debt collection without compliance
- Credit repair services violating laws
Gambling:
- Online casinos or betting platforms (illegal in many jurisdictions)
- Daily fantasy sports (requires licensing)
- Cryptocurrency gambling
- Sweepstakes or contests violating laws
Cannabis and CBD:
- THC products (illegal federally in many countries)
- CBD with health claims (FDA regulated)
- Cannabis delivery services (varies by jurisdiction)
Alcohol and Tobacco:
- Alcohol sales to minors
- Tobacco products (heavily regulated)
- Vaping products (age verification required)
If your business operates in a regulated industry, contact us BEFORE purchasing services.
2.7 Trademark and Brand Abuse
Prohibited Trademark Activities:
- Using Google, Leads Monky, or other trademarks without permission
- Creating misleading domain names with trademarks
- Typosquatting or cybersquatting
- Selling counterfeit goods using branded keywords
- Keyword stuffing with trademarked terms
- False endorsement or affiliation claims
Permitted Use:
- Factual references in comparative advertising (within legal limits)
- Reseller status disclosure (accurate representation only)
2.8 Resource Abuse
Prohibited Infrastructure Abuse:
Excessive Usage:
- Sending volumes far exceeding plan limits
- Bandwidth consumption affecting other customers
- Storage abuse (using Drive for file hosting service)
- API rate limit violations
System Manipulation:
- Circumventing sending limits
- Creating excessive accounts to abuse quotas
- Automated account creation
- Abusing free trial or promotional offers
Cryptocurrency Mining:
- Using Google Workspace resources for mining (prohibited by Google)
2.9 Copyright Infringement
Prohibited Copyright Activities:
- Hosting or distributing pirated content
- Illegal file sharing or torrenting
- Streaming copyrighted content without license
- Selling pirated software, media, or ebooks
- DMCA violations
DMCA Compliance:
- We respond to valid DMCA takedown notices
- Repeat infringers will be terminated
- Counter-notice process available for false claims
2.10 Harassment and Abuse
Prohibited Harassment:
- Stalking or persistent unwanted contact
- Threatening or intimidating communications
- Revenge porn or non-consensual intimate images
- Blackmail or extortion
- Coordinated harassment campaigns
- Swatting or false emergency reports
3. EMAIL DELIVERABILITY REQUIREMENTS
3.1 Technical Compliance
Required Configurations:
- ✓ Valid SPF, DKIM, and DMARC records
- ✓ Accurate reverse DNS (PTR records)
- ✓ WHOIS information (not privacy-protected for sending domains)
- ✓ Valid SSL/TLS certificates
- ✓ Proper MX records
Prohibited:
- ✗ Domains with recent spam history
- ✗ Newly registered domains used immediately for cold email (must age)
- ✗ Disposable or temporary domains
- ✗ Privacy-protected WHOIS for sending domains
3.2 Content Requirements
Email Content Must:
- Include accurate sender information
- Have working unsubscribe links
- Provide physical mailing address
- Use honest subject lines
- Identify as advertisement (where required by law)
Prohibited Content:
- Deceptive subject lines
- Hidden text or images
- Misleading headers
- Excessive CAPS or exclamation marks
- Trigger words designed to evade filters
3.3 Sending Practices
Best Practices (Required):
- Gradual warmup for new accounts (10-50 emails/day increasing slowly)
- Maintain sender reputation (low bounce/complaint rates)
- Monitor blacklists and feedback loops
- Remove hard bounces immediately
- Honor unsubscribe requests within 24 hours
Prohibited:
- Sudden high-volume sending from new accounts
- Ignoring bounce messages
- Continuing to email complainers
- List hygiene neglect
4. MONITORING AND ENFORCEMENT
4.1 Our Monitoring Rights
We reserve the right to monitor:
- Email sending patterns and volumes
- Spam complaint rates and bounce rates
- IP reputation and blacklist status
- Bandwidth and resource usage
- Customer reports and abuse complaints
We do NOT routinely read email content but may review:
- Emails flagged by automated systems
- Content reported by recipients
- Samples when investigating abuse complaints
4.2 Abuse Reporting
How to Report Abuse:
If you receive abusive email from a Leads Monky customer:
- Forward to: abuse@leadsmonky.com
- Include: Full email headers
- Include: Description of violation
- Include: Date/time and frequency
We investigate all abuse reports within 24-48 hours.
4.3 Investigation Process
When investigating violations:
- Automated systems flag suspicious activity
- Manual review of flagged content
- Customer notification (except for severe violations)
- Opportunity to respond (24-72 hours)
- Decision: Warning, suspension, or termination
For severe violations:
- Immediate suspension without notice
- Law enforcement notification (if applicable)
- Permanent termination
4.4 Enforcement Actions
Warning (First Offense – Minor Violations):
- Email notification of violation
- 7 days to correct the issue
- Follow-up monitoring
Suspension (Repeat or Moderate Violations):
- Immediate service suspension
- Investigation period (3-7 days)
- Reinstatement possible if violation corrected
- Reinstatement fee may apply
Termination (Severe or Repeated Violations):
- Permanent account closure
- No refunds
- Blacklisted from future service
- Possible legal action
- Law enforcement reporting (if applicable)
5. CUSTOMER RESPONSIBILITIES
5.1 Your Obligations
You are responsible for:
- Ensuring all use complies with this AUP
- Monitoring your users and subaccounts
- Implementing security measures
- Responding promptly to abuse complaints
- Maintaining accurate contact information
- Educating users about acceptable use
5.2 User Education
If you have multiple users:
- Distribute this AUP to all users
- Implement internal policies
- Monitor user activity
- Take action against violating users
- Report violations to us
5.3 Third-Party Actions
You are responsible for:
- Actions of your employees and contractors
- Third-party agencies using your accounts
- Subaccounts or delegated users
- Anyone with access to your credentials
6. CONSEQUENCES OF VIOLATIONS
6.1 Account Suspension or Termination
Immediate Termination Offenses:
- Child exploitation material (ZERO TOLERANCE)
- Terrorism or violent extremism
- Illegal hacking or unauthorized access
- Phishing or malware distribution
- Severe spam violations (>0.5% complaint rate)
Suspension Pending Investigation:
- Moderate spam complaints
- Copyright infringement
- Fraud or scam operations
- Terms of Service violations
- Excessive resource usage
Warning with Compliance Period:
- Minor deliverability issues
- Technical misconfigurations
- First-time minor policy violations
6.2 No Refunds for Policy Violations
If your account is suspended or terminated for AUP violations:
- No refunds of subscription fees
- No prorated credits
- Outstanding balances remain due
- Access terminated immediately
6.3 Data Retention
After termination for violations:
- Standard 30-day retention does NOT apply to severe violations
- Data may be deleted immediately
- Data may be retained for legal/investigative purposes
- No guarantee of data access or export
6.4 Legal Consequences
Depending on the violation, you may face:
- Civil lawsuits for damages
- Criminal prosecution
- Fines and penalties under anti-spam laws
- Imprisonment for serious crimes
- Reporting to regulatory authorities
Anti-Spam Law Penalties:
- CAN-SPAM (USA): Up to $46,517 per violation
- CASL (Canada): Up to $10 million CAD
- GDPR (EU): Up to €20 million or 4% of annual revenue
6.5 Reputation Damage
Violations may result in:
- Domain blacklisting (permanent damage to reputation)
- IP address blacklisting
- Difficulty obtaining future email services
- Loss of customer trust
- Business closure
7. SAFE HARBOR AND COOPERATION
7.1 Good Faith Compliance
If you discover a violation:
- Self-report immediately to info@leadsmonky.com
- Take corrective action
- Cooperate with our investigation
We may show leniency for:
- Prompt self-reporting
- Immediate corrective measures
- First-time violations
- Good faith mistakes (not intentional abuse)
7.2 Security Vulnerabilities
If you discover a security vulnerability:
- Report to: security@leadsmonky.com
- Do NOT exploit the vulnerability
- Provide details for responsible disclosure
- Allow reasonable time for patching
We will NOT take enforcement action against good-faith security researchers.
8. AMENDMENTS TO THIS POLICY
We may update this AUP to address new threats, legal requirements, or industry best practices.
Changes will be communicated via:
- Email to all active customers
- Website posting with “Last Updated” date
- 30 days’ notice for material changes
Continued use after changes constitutes acceptance.
9. THIRD-PARTY POLICIES
9.1 Google Workspace Acceptable Use Policy
You must also comply with:
- Google Workspace Acceptable Use Policy: https://workspace.google.com/terms/use_policy.html
- Google Cloud Platform Acceptable Use Policy
- Gmail Program Policies
Google’s policies are incorporated by reference.
9.2 Other Applicable Policies
- Payment processor policies (Stripe, PayPal)
- Domain registrar policies
- Anti-spam law requirements
- Industry-specific regulations
10. REPORTING AND CONTACT
10.1 Report Abuse
To report violations:
Abuse Email: abuse@leadsmonky.com
Include:
- Full email headers
- Screenshots or evidence
- Description of violation
- Your contact information
We investigate all reports within 24-48 hours.
10.2 Security Issues
Security Email: security@leadsmonky.com (for vulnerability reports)
10.3 General Compliance Questions
Email: info@leadsmonky.com
Subject Line: “AUP Compliance Question”
Leads Monkey Ltd
692/D, near 3 No Stop, Neelam Block, Iqbal Town
Lahore, Pakistan
11. LEGAL FRAMEWORK
11.1 Applicable Laws
This AUP is designed to ensure compliance with:
- CAN-SPAM Act (USA)
- Canada’s Anti-Spam Legislation (CASL)
- General Data Protection Regulation (GDPR – EU)
- ePrivacy Directive
- Computer Fraud and Abuse Act (USA)
- UK Computer Misuse Act
- Pakistan Electronic Transactions Ordinance 2002
- International anti-spam and cybercrime laws
11.2 Cooperation with Law Enforcement
We cooperate with law enforcement and may:
- Preserve account data for investigations
- Provide data in response to valid legal process
- Report illegal activity proactively
- Testify in legal proceedings
We do NOT require warrants for emergencies involving:
- Imminent threat to life or safety
- Child exploitation material
- Terrorism or violent crimes
ACKNOWLEDGMENT
By using Leads Monky services, you acknowledge:
✓ You have read and understood this Acceptable Use Policy
✓ You agree to comply with all provisions
✓ You understand violations may result in immediate termination
✓ You accept responsibility for all use of your account
✓ You will comply with applicable anti-spam and privacy laws
If you have questions about whether an activity is permitted, contact us BEFORE proceeding.
This Acceptable Use Policy was last updated on April 1, 2026.
Leads Monky is committed to maintaining a safe, legal, and abuse-free service. Thank you for your cooperation.