Ethically-sourced proxies: Learn More External link arrow

Acceptable Use Policy

Responsible Use of the Infatica Network

Infatica provides infrastructure designed to support legitimate web data collection, market research, and online services that rely on global internet access. By accessing or using Infatica services, customers agree to use the platform only for lawful, ethical, and responsible purposes.

Approved and Responsible Use Cases

Infatica supports a wide range of legitimate business activities that require reliable access to publicly available web data. Common examples include:

  • Market and pricing intelligence - collecting publicly available pricing and product information to inform business decisions
  • Ad verification and brand protection - detecting fraudulent advertising or unauthorized brand use
  • Website testing and quality assurance - verifying website functionality across locations and devices
  • Travel and retail aggregation - comparing publicly available offers across multiple platforms
  • Academic and business research - analyzing publicly accessible web data for research purposes

Prohibited Activities

To maintain a secure and ethical network environment, Infatica strictly prohibits any activity that may harm third parties, violate laws, or compromise network integrity. Prohibited activities include, but are not limited to:

Illegal or Fraudulent Activities

Using Infatica services to conduct or facilitate unlawful actions, including fraud, impersonation, identity theft, or distribution of illegal content.

Cybersecurity Attacks

Launching or assisting in attacks against websites or systems, including distributed denial-of-service (DDoS) attacks, vulnerability exploitation, or unauthorized access attempts.

Spam and Automated Abuse

Sending unsolicited communications, mass posting, or automated abuse of websites, messaging systems, or online platforms.

Advertising and Click Fraud

Generating artificial impressions, clicks, or other forms of manipulated engagement that undermine digital advertising ecosystems.

Unauthorized Data Collection

Collecting or attempting to collect private or non-public information, including content behind login pages, authentication systems, or other restricted areas.

Fake Accounts or Manipulated Engagement

Creating fake profiles, posting artificial reviews, or generating fraudulent social media activity such as fake likes, comments, or followers.

Platform Manipulation

Manipulating search engine rankings, automated ticket purchasing, or other activities designed to unfairly influence digital systems.

Any activity that violates applicable laws, third-party rights, or Infatica policies may result in immediate suspension or termination of access.

Monitoring and Abuse Prevention

Infatica actively monitors network activity and investigates reports of suspicious behavior to ensure compliance with this policy. Our abuse prevention framework includes:

  • continuous traffic monitoring and anomaly detection
  • customer identity verification and use-case validation
  • investigation of reported misuse or suspicious activity
  • rapid suspension of accounts engaged in prohibited behavior

These measures help maintain a safe and reliable environment for customers, partners, and network participants.

Enforcement and Account Actions

If Infatica identifies activity that violates this policy, we may take immediate action to protect the network and third parties. Enforcement actions may include:

  • restricting or suspending account access
  • terminating services for repeated or severe violations
  • blocking specific destinations or categories of traffic
  • cooperating with relevant authorities where legally required

Infatica reserves the right to investigate potential violations and apply appropriate measures to maintain network integrity.

Reporting Abuse

Maintaining a responsible network environment requires collaboration between Infatica, our customers, and the broader internet community.

If you suspect that Infatica services are being used in violation of this policy, please report the activity to our compliance team. Reports are reviewed promptly and investigated according to our internal security procedures.