Acceptable Use Policy

Last Updated: July 11, 2025

At ThreatBook, we are committed to providing secure, intelligence-driven services to our customers. This Acceptable Use Policy (“AUP”) outlines the appropriate and prohibited uses of our products and services, including access to our threat intelligence feeds, APIs, software platforms, and related content.

By using ThreatBook products or services, you agree to comply with this AUP.

1. Prohibited Conduct

You may not, and may not allow others to:

  • Use ThreatBook to engage in offensive or unlawful activity, including but not limited to:
    • Disruptive or destructive behavior (e.g. DDoS, scanning, exploitation)
    • Harassment, abuse, stalking, or threats to individuals or organizations
    • Activities that violate export controls, trade sanctions, or local laws
  • Distribute or commercialize ThreatBook data without permission, including:
    • Reselling our intelligence feeds or platforms
    • Copying or republishing Indicators of Compromise (IOCs) for external redistribution
    • Using ThreatBook data to build competing products
  • Reverse engineer or tamper with our systems, including:
    • Attempting to decompile, disassemble, or bypass license enforcement
    • Interfering with or degrading ThreatBook’s services or infrastructure
  • Misrepresent ThreatBook intelligence or misuse branding, such as:
    • Presenting our information as your own
    • Using ThreatBook brand assets without written consent

2. Security & Platform Integrity

To protect all users, you must not:

  • Circumvent authentication or authorization mechanisms
  • Interfere with service availability (e.g., overloading APIs or brute force)
  • Access non-public systems, accounts, or data without authorization

We monitor for abusive behavior and may throttle, suspend, or terminate access that threatens our systems or customers.

3. Research Use

You may use ThreatBook products for academic or security research only if:

  • You do not use the data offensively or for surveillance
  • You do not attempt to repurpose or republish content
  • You comply with responsible disclosure guidelines

If you're a security researcher working with ThreatBook feeds, please contact us at legal@threatbook.com for formal approval or cooperation frameworks.

4. Enforcement & Reporting

Violations of this policy may result in suspension or termination of access without prior notice. We reserve the right to cooperate with law enforcement or regulators as necessary.

If you become aware of abuse or a violation of this policy, please report it to:

legal@threatbook.io