services

Abuse policy - Agastiyar Research and Technologies

We treat all abuse reports concerning Agastiyar Research and Technologies seriously and are dedicated to investigating all violations submitted to us. If you come across content on our platform as mentioned in Terms of Service that you think violates our Terms of Service, please report a violation. After you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share. We may close your report without a response, if we believe that the reported instance does not amount to a violation.

Types of Abuse

We have sorted various kinds of abuse into the following categories:

Spam, Malware and Phishing 

Users are prohibited from using Our Services for the transmission of "junk mail", "spam", "chain letters", “phishing” or unsolicited mass distribution of email.

Promotes Hatred, Violence or Illegal/Offensive Activities

Transmission or publishing any content that –

  • is unlawful, illegal, hateful, promotes racism or promotes discrimination or hatred based on ethnicity, and
  • defames, abuses, harasses, stalks, threatens or otherwise violates privacy and other legal rights of others, are explicitly considered as prohibited activities by us.

Sexually Explicit Material

Sexually explicit materials are those materials that contain adult or mature content. We do not authorize users to publish or transmit sexually explicit material using Our Services.

Child Exploitation

We have a zero tolerance policy towards content that exploits children. This means we will terminate the accounts of any user that we find sharing or publishing child abuse content. We will also report the content and its owner to law enforcement authorities.

Personal and Confidential Information 

We do not allow use of our services to publish personal and confidential information of persons that is not publicly accessible without their explicit consent. Examples of personal and confidential information are full name, phone number, address, social security number, credit card number, government issued identification card details and bank information.

Copyright infringement

Copyright infringement occurs when someone other than the copyright holder copies the “expression” of a work. If you discover that there has been copyright infringement by a user involving your work we will take necessary action as per our company policies.

Other Violations

If you believe that you have a violation to report, that does not fall within any of the categories mentioned above, you may choose this to report such violation. Please note that you will be required to provide a description of such violation for us to take an appropriate action.