Skip to main content
ToolByte Logo

Product Policy

ToolByte

Product-Specific Policy 1.0

ToolByte Acceptable Use Policy

Last Updated: February 28, 2026

Important Notice

This is a product-specific policy. In case of any conflict between this policy and our Common Policies, this product-specific policy shall prevail for the applicable product.

Found matches
No matches found for ""

1. Purpose

This Acceptable Use Policy ("AUP") defines the rules, guidelines, and boundaries for using ToolByte. Its purpose is to:

• Ensure a safe, reliable, and fair experience for all users
• Protect the integrity, security, and availability of our infrastructure
• Prevent misuse of our tools and services
• Comply with applicable laws and regulations

By using ToolByte, you agree to comply with this AUP at all times. This policy supplements and should be read together with our Terms of Service.

2. Prohibited Activities

When using ToolByte, you must NOT engage in any of the following activities:

Illegal Activities:
• Engage in, facilitate, or promote any activity that violates any applicable local, state, national, or international law or regulation
• Use ToolByte to process content that violates intellectual property rights (copyright, trademark, patent, or trade secret) of any third party
• Use ToolByte in connection with any fraudulent or deceptive schemes
• Use ToolByte to violate export control or sanctions laws

Harmful Content:
• Submit, process, or generate malicious code, including viruses, worms, trojans, ransomware, spyware, adware, or any other malware
• Process content that is designed to harm, exploit, or endanger others
• Use our tools to generate spam, phishing emails, fraudulent communications, or social engineering attacks
• Process or generate content that is obscene, defamatory, threatening, or constitutes harassment

System Abuse:
• Attempt to bypass, circumvent, or disable any security measures, access controls, rate limits, or other protective features of the Service
• Overload our servers, infrastructure, or network with excessive, disproportionate, or intentionally disruptive traffic or requests
• Use automated tools, bots, scripts, crawlers, or scrapers to access, extract, or harvest data from ToolByte without our prior written permission
• Interfere with, disrupt, or degrade the Service or infrastructure used by ToolByte or its users
• Attempt to probe, scan, or test the vulnerability of the Service or any system or network connected to the Service without authorization
• Attempt to decompile, disassemble, reverse engineer, or otherwise derive the source code of any part of the Service

Account Abuse:
• Access accounts, credentials, or data belonging to other users without authorization
• Create multiple accounts to circumvent rate limits, bans, or other restrictions
• Share account credentials with unauthorized individuals
• Impersonate any person or entity, or falsely represent your affiliation with any person or entity

Data and Privacy Violations:
• Intercept, monitor, or collect data transmitted through the Service without proper authorization
• Collect personally identifiable information (PII) of other users without their consent
• Use ToolByte to process personal data in violation of applicable data protection laws (e.g., GDPR, DPDP Act, CCPA)

Intellectual Property Violations:
• Use ToolByte tools to strip or remove copyright notices, watermarks, or other proprietary identifiers from content belonging to others
• Reproduce, distribute, or publish copyrighted materials through the Service without appropriate authorization or license
• Use ToolByte to facilitate copyright infringement or piracy

3. Rate Limiting and Fair Usage

To ensure fair and equitable access for all users, we implement rate limiting and fair usage controls:

Rate Limits:
• Tool requests are subject to rate limits based on your IP address and/or user account
• The specific rate limits may vary by tool and are designed to allow reasonable use while preventing abuse
• Rate limits exist to protect the Service from overload and to ensure availability for all users

When Rate Limits Are Exceeded:
• If you exceed the rate limit, your requests will be temporarily throttled or blocked
• You will receive an appropriate error response indicating the rate limit has been reached
• Rate limits automatically reset after the specified cooldown period

Fair Usage:
• ToolByte is designed for individual, interactive use
• Automated, bulk, or programmatic access is not permitted without our prior written authorization
• If you require higher rate limits or commercial/API access, please contact us at legal@duodev.in

4. Content Guidelines

When using ToolByte tools to process content, you must ensure that:

Content You Process:
• You own the content or have the necessary rights, licenses, or permissions to process it
• The content does not infringe the intellectual property, privacy, publicity, or other rights of any third party
• The content complies with all applicable laws and regulations
• The content is not malicious, harmful, or designed to exploit vulnerabilities

Tool Output:
• You are solely responsible for reviewing, validating, and verifying all output generated by our tools before using it
• We do not guarantee the accuracy, correctness, or completeness of tool output
• Output from our tools should not be relied upon as professional advice (legal, financial, security, or otherwise)

5. Security Requirements

All users are expected to follow basic security practices when using ToolByte:

• Keep credentials secure: Do not share your login credentials. Use a strong, unique password for your ToolByte account.
• Report vulnerabilities responsibly: If you discover a security vulnerability in ToolByte, please report it to us at legal@duodev.in rather than exploiting or publicly disclosing it. We appreciate responsible disclosure.
• Do not test security without permission: Do not probe, scan, or test the security of our systems without our explicit, written authorization.
• Use secure connections: Always access ToolByte over HTTPS.

6. Reporting Violations

If you encounter any violation of this Acceptable Use Policy, we encourage you to report it to us promptly.

How to Report:
• Email: legal@duodev.in
• Subject Line: "AUP Violation Report - ToolByte"

What to Include in Your Report:
• A description of the violation
• Any relevant evidence (screenshots, URLs, timestamps)
• Your contact information (for follow-up purposes; reports can also be submitted anonymously)

We will review all reports and take appropriate action.

7. Consequences of Violation

Violations of this Acceptable Use Policy may result in the following actions, depending on the severity, frequency, and nature of the violation:

• Minor / First Offense: Written warning via email with details of the violation and guidance for compliance
• Moderate / Repeated Offense: Temporary suspension of access to the Service
• Severe / Persistent Offense: Permanent termination of account and ban from the Service
• Criminal / Egregious Offense: Referral to law enforcement authorities and/or initiation of legal proceedings

In cases where a violation poses an immediate threat to the security, integrity, or availability of the Service, we reserve the right to take immediate action (including suspending or terminating access) without prior notice.

Appeals Process: If you believe that enforcement action was taken against you in error, you may appeal the decision by emailing legal@duodev.in with the subject line "AUP Appeal - ToolByte". Include your account details, a description of the action taken, and an explanation of why you believe the action was unwarranted. We will review your appeal within 15 business days.

8. Contact Information

If you have any questions about this Acceptable Use Policy, please contact us:

Duo Dev Technologies
• Email: legal@duodev.in
• Phone: +91 94876 90260
• Registered Address: 2/45, JJ Colony, Near Common Service Centre, Mettupattithathanur, Salem, Tamil Nadu - 636103, India
• GSTIN: 33AAWFD9000D1ZM
• Website: https://duodev.in
• Legal Center: https://legal.duodev.in

Related Policies