Acceptable use policy

ACCEPTABLE USE POLICY

Last Updated: April 1, 2026

Leads Monkey Ltd
692/D, near 3 No Stop, Neelam Block, Iqbal Town
Lahore, Pakistan
Email: info@leadsmonky.com
Website: https://leadsmonky.com


1. PURPOSE AND SCOPE

This Acceptable Use Policy (“AUP”) defines prohibited uses of Leads Monky services, including Google Workspace reseller services and cold email infrastructure setup. This policy protects Leads Monky, our customers, Google, and the broader internet community from abusive, illegal, or harmful activities.

This AUP applies to:

  • All Leads Monky customers and users
  • All Google Workspace accounts provisioned through Leads Monky
  • All email infrastructure and domain configurations we manage
  • All use of our support services and platforms

BY USING LEADS MONKY SERVICES, YOU AGREE TO COMPLY WITH THIS POLICY.

Violations may result in:

  • Immediate account suspension
  • Permanent termination without refund
  • Reporting to law enforcement
  • Legal action for damages
  • Blacklisting from future service

2. PROHIBITED ACTIVITIES

2.1 Illegal Activities

You MAY NOT use our services for any illegal purpose, including but not limited to:

Criminal Activity:

  • Any activity that violates local, national, or international law
  • Drug trafficking or illegal substance distribution
  • Money laundering or terrorist financing
  • Human trafficking or exploitation
  • Sale of illegal weapons or explosives
  • Counterfeiting or forgery
  • Identity theft or impersonation for fraud
  • Unauthorized access to computer systems (hacking)

Intellectual Property Violations:

  • Copyright infringement (pirated software, movies, music)
  • Trademark infringement
  • Patent violations
  • Trade secret theft
  • Distribution of counterfeit goods
  • Unauthorized use of licensed materials

Fraud and Financial Crimes:

  • Ponzi schemes or pyramid schemes
  • Investment fraud or securities manipulation
  • Credit card fraud or payment fraud
  • Tax evasion schemes
  • Advance fee fraud (419 scams)
  • Cryptocurrency pump-and-dump schemes
  • Fake invoice scams

2.2 Spam and Unsolicited Email

STRICT ANTI-SPAM POLICY:

Prohibited Email Practices:

  • Sending unsolicited bulk email (spam)
  • Email lists purchased or scraped without consent
  • Sending to recipients who have not opted in
  • Ignoring unsubscribe requests
  • Harvesting email addresses from websites
  • Dictionary attacks or address list generation
  • Email flooding or mail bombing
  • Spoofing sender addresses to hide identity

Legal Compliance Required:
All email sending must comply with:

  • CAN-SPAM Act (USA): Opt-out mechanism, accurate headers, physical address
  • CASL (Canada): Express or implied consent, identification, unsubscribe mechanism
  • GDPR (EU): Lawful basis for processing, consent where required
  • ePrivacy Directive: Consent for marketing emails
  • Australia Spam Act 2003: Consent and unsubscribe requirements

Cold Email Best Practices (Required):

  • ✓ Legitimate business purpose (B2B sales, networking)
  • ✓ Researched, targeted recipient lists
  • ✓ Personalized messages (not generic templates to thousands)
  • ✓ Clear sender identification
  • ✓ Working unsubscribe mechanism
  • ✓ Respect opt-out requests immediately
  • ✓ Business physical address included
  • ✓ Accurate subject lines (no deception)
  • ✓ Reasonable sending volumes (not mass spam)

Prohibited Cold Email Practices:

  • ✗ Scraping contact info without consent
  • ✗ Buying email lists from third parties
  • ✗ Mass generic emails to thousands
  • ✗ Misleading subject lines or from names
  • ✗ No unsubscribe link
  • ✗ Continuing after unsubscribe request
  • ✗ Impersonating others or companies
  • ✗ Using disposable domains to evade blocks

Spam Complaint Thresholds:

  • 0.1% complaint rate: Warning and monitoring
  • 0.3% complaint rate: Suspension pending review
  • 0.5% complaint rate: Immediate termination

2.3 Phishing, Malware, and Security Threats

Prohibited Security-Related Activities:

Phishing:

  • Impersonating banks, payment processors, or trusted entities
  • Fake login pages or credential harvesting
  • Social engineering attacks
  • CEO fraud or business email compromise (BEC)
  • Fake invoice or payment redirect scams

Malware Distribution:

  • Viruses, trojans, or worms
  • Ransomware
  • Spyware or keyloggers
  • Cryptominers
  • Botnet command-and-control
  • Malicious scripts or exploits

Hacking and Unauthorized Access:

  • Attempting to breach security systems
  • Port scanning or vulnerability scanning without authorization
  • Distributed Denial of Service (DDoS) attacks
  • Exploiting software vulnerabilities
  • Brute force password attacks
  • SQL injection or other code injection attacks

Network Abuse:

  • IP spoofing or packet manipulation
  • Sending excessive traffic to overwhelm systems
  • Interfering with other users’ service
  • Circumventing authentication or access controls

2.4 Harmful Content

Prohibited Content Types:

Child Exploitation Material:

  • Any content depicting minors in sexual contexts (ZERO TOLERANCE)
  • Child sexual abuse material (CSAM)
  • Grooming or solicitation of minors
  • Violations reported immediately to National Center for Missing & Exploited Children (NCMEC) and law enforcement

Adult/Sexual Content:

  • Pornography or sexually explicit material
  • Escort services or sexual services
  • Adult content sent to non-consenting recipients
  • Sex trafficking or exploitation

Violence and Threats:

  • Threats of physical violence or harm
  • Promotion of terrorism or violent extremism
  • Instructions for making weapons or explosives
  • Glorification of violence or mass shootings
  • Assassination markets or hitman services

Hate Speech and Discrimination:

  • Content promoting hatred based on race, ethnicity, religion, gender, sexual orientation, disability
  • Nazi or white supremacist propaganda
  • Genocidal content or calls for ethnic cleansing
  • Harassment or bullying campaigns
  • Doxxing (publishing private information to incite harassment)

Self-Harm Content:

  • Promotion of suicide or self-injury
  • Pro-anorexia or pro-bulimia content
  • Instructions for dangerous challenges or activities

2.5 Deceptive Practices

Prohibited Deceptive Activities:

Scams and Fraud:

  • Get-rich-quick schemes
  • Work-from-home scams
  • Fake job offers or employment fraud
  • Romance scams or catfishing
  • Tech support scams
  • Fake charity or disaster relief scams
  • Lottery or prize scams

False Advertising:

  • Misleading product claims
  • Fake reviews or testimonials
  • Counterfeit goods
  • Multi-level marketing (MLM) schemes violating laws
  • Unsubstantiated health claims

Impersonation:

  • Pretending to be another person or company
  • Fake government or authority impersonation
  • Brand impersonation
  • Celebrity or influencer impersonation

2.6 Regulated Industries (Special Requirements)

High-Risk Industries Requiring Pre-Approval:

Healthcare and Pharmaceuticals:

  • Prescription drug sales (illegal without proper licensing)
  • Medical devices requiring FDA approval
  • Controlled substances
  • Telemedicine without proper credentials
  • Health claims violating FDA/FTC regulations

Financial Services:

  • Unlicensed investment advice
  • Forex or cryptocurrency trading platforms (requires licensing)
  • Payday loans or high-interest lending
  • Debt collection without compliance
  • Credit repair services violating laws

Gambling:

  • Online casinos or betting platforms (illegal in many jurisdictions)
  • Daily fantasy sports (requires licensing)
  • Cryptocurrency gambling
  • Sweepstakes or contests violating laws

Cannabis and CBD:

  • THC products (illegal federally in many countries)
  • CBD with health claims (FDA regulated)
  • Cannabis delivery services (varies by jurisdiction)

Alcohol and Tobacco:

  • Alcohol sales to minors
  • Tobacco products (heavily regulated)
  • Vaping products (age verification required)

If your business operates in a regulated industry, contact us BEFORE purchasing services.


2.7 Trademark and Brand Abuse

Prohibited Trademark Activities:

  • Using Google, Leads Monky, or other trademarks without permission
  • Creating misleading domain names with trademarks
  • Typosquatting or cybersquatting
  • Selling counterfeit goods using branded keywords
  • Keyword stuffing with trademarked terms
  • False endorsement or affiliation claims

Permitted Use:

  • Factual references in comparative advertising (within legal limits)
  • Reseller status disclosure (accurate representation only)

2.8 Resource Abuse

Prohibited Infrastructure Abuse:

Excessive Usage:

  • Sending volumes far exceeding plan limits
  • Bandwidth consumption affecting other customers
  • Storage abuse (using Drive for file hosting service)
  • API rate limit violations

System Manipulation:

  • Circumventing sending limits
  • Creating excessive accounts to abuse quotas
  • Automated account creation
  • Abusing free trial or promotional offers

Cryptocurrency Mining:

  • Using Google Workspace resources for mining (prohibited by Google)

2.9 Copyright Infringement

Prohibited Copyright Activities:

  • Hosting or distributing pirated content
  • Illegal file sharing or torrenting
  • Streaming copyrighted content without license
  • Selling pirated software, media, or ebooks
  • DMCA violations

DMCA Compliance:

  • We respond to valid DMCA takedown notices
  • Repeat infringers will be terminated
  • Counter-notice process available for false claims

2.10 Harassment and Abuse

Prohibited Harassment:

  • Stalking or persistent unwanted contact
  • Threatening or intimidating communications
  • Revenge porn or non-consensual intimate images
  • Blackmail or extortion
  • Coordinated harassment campaigns
  • Swatting or false emergency reports

3. EMAIL DELIVERABILITY REQUIREMENTS

3.1 Technical Compliance

Required Configurations:

  • ✓ Valid SPF, DKIM, and DMARC records
  • ✓ Accurate reverse DNS (PTR records)
  • ✓ WHOIS information (not privacy-protected for sending domains)
  • ✓ Valid SSL/TLS certificates
  • ✓ Proper MX records

Prohibited:

  • ✗ Domains with recent spam history
  • ✗ Newly registered domains used immediately for cold email (must age)
  • ✗ Disposable or temporary domains
  • ✗ Privacy-protected WHOIS for sending domains

3.2 Content Requirements

Email Content Must:

  • Include accurate sender information
  • Have working unsubscribe links
  • Provide physical mailing address
  • Use honest subject lines
  • Identify as advertisement (where required by law)

Prohibited Content:

  • Deceptive subject lines
  • Hidden text or images
  • Misleading headers
  • Excessive CAPS or exclamation marks
  • Trigger words designed to evade filters

3.3 Sending Practices

Best Practices (Required):

  • Gradual warmup for new accounts (10-50 emails/day increasing slowly)
  • Maintain sender reputation (low bounce/complaint rates)
  • Monitor blacklists and feedback loops
  • Remove hard bounces immediately
  • Honor unsubscribe requests within 24 hours

Prohibited:

  • Sudden high-volume sending from new accounts
  • Ignoring bounce messages
  • Continuing to email complainers
  • List hygiene neglect

4. MONITORING AND ENFORCEMENT

4.1 Our Monitoring Rights

We reserve the right to monitor:

  • Email sending patterns and volumes
  • Spam complaint rates and bounce rates
  • IP reputation and blacklist status
  • Bandwidth and resource usage
  • Customer reports and abuse complaints

We do NOT routinely read email content but may review:

  • Emails flagged by automated systems
  • Content reported by recipients
  • Samples when investigating abuse complaints

4.2 Abuse Reporting

How to Report Abuse:

If you receive abusive email from a Leads Monky customer:

  • Forward to: abuse@leadsmonky.com
  • Include: Full email headers
  • Include: Description of violation
  • Include: Date/time and frequency

We investigate all abuse reports within 24-48 hours.

4.3 Investigation Process

When investigating violations:

  1. Automated systems flag suspicious activity
  2. Manual review of flagged content
  3. Customer notification (except for severe violations)
  4. Opportunity to respond (24-72 hours)
  5. Decision: Warning, suspension, or termination

For severe violations:

  • Immediate suspension without notice
  • Law enforcement notification (if applicable)
  • Permanent termination

4.4 Enforcement Actions

Warning (First Offense – Minor Violations):

  • Email notification of violation
  • 7 days to correct the issue
  • Follow-up monitoring

Suspension (Repeat or Moderate Violations):

  • Immediate service suspension
  • Investigation period (3-7 days)
  • Reinstatement possible if violation corrected
  • Reinstatement fee may apply

Termination (Severe or Repeated Violations):

  • Permanent account closure
  • No refunds
  • Blacklisted from future service
  • Possible legal action
  • Law enforcement reporting (if applicable)

5. CUSTOMER RESPONSIBILITIES

5.1 Your Obligations

You are responsible for:

  • Ensuring all use complies with this AUP
  • Monitoring your users and subaccounts
  • Implementing security measures
  • Responding promptly to abuse complaints
  • Maintaining accurate contact information
  • Educating users about acceptable use

5.2 User Education

If you have multiple users:

  • Distribute this AUP to all users
  • Implement internal policies
  • Monitor user activity
  • Take action against violating users
  • Report violations to us

5.3 Third-Party Actions

You are responsible for:

  • Actions of your employees and contractors
  • Third-party agencies using your accounts
  • Subaccounts or delegated users
  • Anyone with access to your credentials

6. CONSEQUENCES OF VIOLATIONS

6.1 Account Suspension or Termination

Immediate Termination Offenses:

  • Child exploitation material (ZERO TOLERANCE)
  • Terrorism or violent extremism
  • Illegal hacking or unauthorized access
  • Phishing or malware distribution
  • Severe spam violations (>0.5% complaint rate)

Suspension Pending Investigation:

  • Moderate spam complaints
  • Copyright infringement
  • Fraud or scam operations
  • Terms of Service violations
  • Excessive resource usage

Warning with Compliance Period:

  • Minor deliverability issues
  • Technical misconfigurations
  • First-time minor policy violations

6.2 No Refunds for Policy Violations

If your account is suspended or terminated for AUP violations:

  • No refunds of subscription fees
  • No prorated credits
  • Outstanding balances remain due
  • Access terminated immediately

6.3 Data Retention

After termination for violations:

  • Standard 30-day retention does NOT apply to severe violations
  • Data may be deleted immediately
  • Data may be retained for legal/investigative purposes
  • No guarantee of data access or export

6.4 Legal Consequences

Depending on the violation, you may face:

  • Civil lawsuits for damages
  • Criminal prosecution
  • Fines and penalties under anti-spam laws
  • Imprisonment for serious crimes
  • Reporting to regulatory authorities

Anti-Spam Law Penalties:

  • CAN-SPAM (USA): Up to $46,517 per violation
  • CASL (Canada): Up to $10 million CAD
  • GDPR (EU): Up to €20 million or 4% of annual revenue

6.5 Reputation Damage

Violations may result in:

  • Domain blacklisting (permanent damage to reputation)
  • IP address blacklisting
  • Difficulty obtaining future email services
  • Loss of customer trust
  • Business closure

7. SAFE HARBOR AND COOPERATION

7.1 Good Faith Compliance

If you discover a violation:

  • Self-report immediately to info@leadsmonky.com
  • Take corrective action
  • Cooperate with our investigation

We may show leniency for:

  • Prompt self-reporting
  • Immediate corrective measures
  • First-time violations
  • Good faith mistakes (not intentional abuse)

7.2 Security Vulnerabilities

If you discover a security vulnerability:

  • Report to: security@leadsmonky.com
  • Do NOT exploit the vulnerability
  • Provide details for responsible disclosure
  • Allow reasonable time for patching

We will NOT take enforcement action against good-faith security researchers.


8. AMENDMENTS TO THIS POLICY

We may update this AUP to address new threats, legal requirements, or industry best practices.

Changes will be communicated via:

  • Email to all active customers
  • Website posting with “Last Updated” date
  • 30 days’ notice for material changes

Continued use after changes constitutes acceptance.


9. THIRD-PARTY POLICIES

9.1 Google Workspace Acceptable Use Policy

You must also comply with:

  • Google Workspace Acceptable Use Policy: https://workspace.google.com/terms/use_policy.html
  • Google Cloud Platform Acceptable Use Policy
  • Gmail Program Policies

Google’s policies are incorporated by reference.

9.2 Other Applicable Policies

  • Payment processor policies (Stripe, PayPal)
  • Domain registrar policies
  • Anti-spam law requirements
  • Industry-specific regulations

10. REPORTING AND CONTACT

10.1 Report Abuse

To report violations:

Abuse Email: abuse@leadsmonky.com
Include:

  • Full email headers
  • Screenshots or evidence
  • Description of violation
  • Your contact information

We investigate all reports within 24-48 hours.

10.2 Security Issues

Security Email: security@leadsmonky.com (for vulnerability reports)

10.3 General Compliance Questions

Email: info@leadsmonky.com
Subject Line: “AUP Compliance Question”

Leads Monkey Ltd
692/D, near 3 No Stop, Neelam Block, Iqbal Town
Lahore, Pakistan


11. LEGAL FRAMEWORK

11.1 Applicable Laws

This AUP is designed to ensure compliance with:

  • CAN-SPAM Act (USA)
  • Canada’s Anti-Spam Legislation (CASL)
  • General Data Protection Regulation (GDPR – EU)
  • ePrivacy Directive
  • Computer Fraud and Abuse Act (USA)
  • UK Computer Misuse Act
  • Pakistan Electronic Transactions Ordinance 2002
  • International anti-spam and cybercrime laws

11.2 Cooperation with Law Enforcement

We cooperate with law enforcement and may:

  • Preserve account data for investigations
  • Provide data in response to valid legal process
  • Report illegal activity proactively
  • Testify in legal proceedings

We do NOT require warrants for emergencies involving:

  • Imminent threat to life or safety
  • Child exploitation material
  • Terrorism or violent crimes

ACKNOWLEDGMENT

By using Leads Monky services, you acknowledge:

✓ You have read and understood this Acceptable Use Policy
✓ You agree to comply with all provisions
✓ You understand violations may result in immediate termination
✓ You accept responsibility for all use of your account
✓ You will comply with applicable anti-spam and privacy laws

If you have questions about whether an activity is permitted, contact us BEFORE proceeding.


This Acceptable Use Policy was last updated on April 1, 2026.

Leads Monky is committed to maintaining a safe, legal, and abuse-free service. Thank you for your cooperation.

Index
Scroll to Top