Acceptable Use Policy

Updated: February 15, 2023

To make sure our customers have reliable data for making business decisions, Elevar, LLC (“Elevar “ or “we”) need to keep our products and services running well. To do this, we ask that members of our community do not misuse or abuse them. Below is a list of activities (not exhaustive) that go against Elevar’s mission to help businesses grow. This policy explains these prohibited activities in more detail.

This Acceptable Use Policy (“AUP“) applies to the use of any product, service or website provided by Elevar (collectively, the “Services“), whether we provide it directly or a partner of ours provides it to you (“End User”). By using any of the Services, you are agreeing to this Policy. Capitalized terms used below but not defined in this Policy have the meanings set forth in our Terms of Service.

Prohibited Content

You may not use the Services to do, solicit, display, store, process, send or transmit the following:

  • Violations of Laws. Violating laws, regulations, governmental orders, or industry standards or guidance in any applicable jurisdiction (collectively, “Applicable Laws”). This includes violating Applicable Laws requiring (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications.
  • Interference with the Services. Interfering with or otherwise negatively impacting any aspect of the Services or any third-party networks that are linked to the Services.
  • Reverse Engineering. Reverse engineering, copying, disassembling or decompiling the Services.
  • Falsification of Identity or Origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.

No Service Integrity Violations. You shall not violate the integrity of the Services, including:

  • Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Services.
  • Security Vulnerabilities. Finding security vulnerabilities to exploit the Services or attempting to bypass any security mechanism or filtering capabilities.
  • Disabling the Services. Any denial of service (DoS) attack on the Services or any other conduct that attempts to disrupt, disable or overload the Services.
  • Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Services.
  • Unauthorized Access. Attempting to gain unauthorized access to the Services.

We reserve the right to check your usage of our Services whenever we want to make sure you are following this policy, our Terms of Service and any other agreements between us. If we find that you are in breach of this policy or helping others to do so, we may stop your use of our Services without any warning.

We may update this Policy from time to time by posting an updated version at The “Updated” date on top of this policy will reflect the date of the latest version. The updates will take effect as soon as they are posted, so we recommend that you check this policy regularly. By continuing to use our Services, you agree to the updated policy. 

If you become aware of any violation of this policy, please contact us at [email protected].