Zarla Platform Content Policy
This Platform Content Policy ("Policy") applies to your use of our services ("Services"). By accessing or using our Services, you agree to comply with this Policy. Violations may result in suspension or termination of your account. We reserve the right to update or modify this Policy at any time, effective upon posting the revised Policy on our website.
1. Account Governance & Enforcement
1.1 Applicability & Responsibility
a. This Policy applies to all content stored on, transmitted through, or otherwise served by our platform.
b. You are responsible for any content or activities conducted by third-party contractors, agents, or affiliates on your behalf.
c. We may enforce this Policy retroactively, acting on violations discovered after the fact—even if you removed or changed the content.
d. Lack of knowledge or intent does not excuse you from responsibility for violations.
1.2 Account Management & Data Access
a. We reserve the right to identify account relationships based on shared payment methods, IP addresses, technical fingerprints, or behavioral patterns.
b. We may take enforcement action across all linked accounts if a pattern of abuse is detected.
c. Creating multiple accounts to bypass restrictions or reinstatement blocks is prohibited.
d. New accounts must age at least 7 days before accessing certain platform features.
e. Creating temporary or disposable accounts for any purpose is prohibited.
f. If your account is terminated for violations, you may lose immediate access to your data.
g. You are advised to keep off-platform backups compliant with this Policy.
h. You must use the service at least once every 2 years.
i. Accounts must maintain consistent identifying information and usage patterns.
1.3 Compliance & Documentation
a. We may require you to provide documentation or other evidence demonstrating compliance with legal, regulatory, or licensing obligations.
b. Documentation must be provided within 72 hours of request unless otherwise specified.
c. Even if content is encrypted, if we have reason to believe it violates this Policy or the law, we reserve the right to request decryption or remove the content.
d. Decryption requests must be complied with within 48 hours.
e. Failure to comply with decryption requests within the specified timeframe may result in immediate content removal and account suspension.
f. You must comply with all applicable laws in your jurisdiction and in the jurisdictions where your content or services are offered.
g. If you lose a required license or permit, you must immediately notify us and cease the related activity.
h. Any environment for penetration testing or malware research must be pre-approved, with clear documentation of scope and security measures.
1.4 External Content & Linking
a. "Hosting" under this Policy includes providing direct or indirect access to prohibited content through links, embeds, iframes, redirects, or other technical methods.
b. This includes but is not limited to URL shorteners, redirect chains, or any other method of obscuring the final destination of a link.
c. Users must maintain transparency about the destination of any external links.
d. Multiple redirects or obfuscation methods may be treated as an attempt to circumvent this policy.
1.5 Final Discretion & Non-Exhaustive Policy
a. Examples in this Policy are illustrative, not exhaustive.
b. We have final discretion to interpret and apply this Policy, and we may act immediately on threats to public safety, legal compliance, or platform integrity.
1.6 Indemnification
You agree to indemnify, defend, and hold us harmless for claims arising from any violation of this Policy by you or third parties using your account.
2. Security and Technical Abuse
2.1 Malware and Harmful Code
a. Distribution of viruses, malware, or destructive code.
b. Content that attempts to install software without user consent.
c. Code that generates harmful pop-ups or interferes with user systems.
d. Any content that harms networks, servers, or infrastructure.
e. Distribution of corrupted files or hoaxes.
f. Items of a destructive or deceptive nature.
g. Disabling or circumventing service functionality.
2.2 System and Service Abuse
a. Probing, scanning, or testing system vulnerabilities without authorization.
b. Bypassing security or authentication measures.
c. Decompiling or reverse-engineering service components.
d. Creating unreasonable load on infrastructure, defined as:
i. Exceeding 1000 requests per minute per IP address.
ii. Utilizing more than 80% of allocated CPU resources for more than 5 minutes.
iii. Consuming more than 75% of allocated bandwidth for more than 15 minutes.
iv. Any automated activity that impacts service performance for other users.
e. Using automated scraping/crawling tools without authorization.
f. Using shared credentials or sharing passwords in violation of Terms.
g. Gaining unauthorized access to services.
h. Disrupting or impairing service use by others.
3. Critical Systems and Safety
3.1 High-Risk Activities
a. Using Services for activities that could lead to death or injury.
b. Operating nuclear facilities or life-support systems.
c. Air traffic control systems.
d. Critical infrastructure where failure could cause harm.
e. Weapons systems.
f. Emergency services dispatch systems.
4. Government and Regulatory Compliance
4.1 Export and Trade Restrictions
a. Using Services in embargoed or sanctioned countries.
b. Violations of export control laws and regulations.
c. Unauthorized government software usage.
d. Non-compliance with trade restrictions.
4.2 Corruption and Improper Conduct
a. Bribery and kickbacks.
b. Improper payments or gifts.
c. Unauthorized business incentives.
d. Corruption of public officials.
5. Illegal Activities and Content
5.1 Child Exploitation
a. Any child sexual abuse materials (CSAM).
b. Content sexualizing minors.
c. Child grooming activities.
d. Sextortion of minors.
e. Unauthorized images of minors in exploitative contexts.
f. Child trafficking content.
g. Sextortion (including content involving non-minors).
5.2 Fraud and Deception
a. Using unauthorized payment methods or credit cards.
b. Interference with civic/democratic processes.
c. Accessing non-public areas of services or data without permission.
d. Unsolicited bulk emails violating CAN-SPAM laws.
e. Phishing attempts.
f. Scams and fraudulent schemes.
g. False or deceptive marketing.
h. Impersonation of individuals or organizations.
i. Misrepresenting qualifications or affiliations.
5.3 Regulated Goods and Services
a. Illegal drugs and controlled substances.
b. Unauthorized weapon sales.
c. Illegal gambling operations.
d. Unauthorized pharmaceutical sales.
e. Trading in endangered species products.
f. Unlicensed financial services.
5.4 Intellectual Property Violations
a. Copyright infringement.
b. Trademark violations.
c. Unauthorized use of proprietary content.
d. Distribution of pirated materials.
6. Privacy and Personal Information
6.1 Unauthorized Personal Information
a. Publishing a private individual's details without consent (doxxing).
b. Sharing confidential financial information.
c. Distributing medical records.
d. Posting government ID numbers (passports, SSNs).
e. Publishing private contact information.
f. HIPAA-protected health information.
g. Private health documents and medical records.
h. Content promoting dangerous health practices.
6.2 Non-consensual Intimate Content
a. Revenge porn.
b. Unauthorized sharing of intimate images.
c. Sexually explicit content without consent.
d. Distribution of private sexual materials.
7. Harmful Content
7.1 Violence and Gore
a. Gratuitous violence.
b. Ultra-graphic violence (dismemberment, mutilation).
c. Content promoting acts of violence.
d. Celebrating violent attacks.
e. Excessive gore or shocking content.
f. Instructions for violent acts.
7.2 Harassment and Threats
a. Cyberbullying.
b. Threats of harm (death threats, doxxing).
c. Coordinated harassment campaigns.
d. Targeting specific non-public individuals.
e. Unwanted sexualization of individuals.
f. Exposing private information for harassment.
7.3 Hate Speech and Discrimination
a. Content promoting hatred based on protected characteristics.
b. Discriminatory content targeting groups.
c. Content promoting harmful stereotypes.
d. Materials inciting discrimination or violence.
e. Dehumanizing content about protected groups.
7.4 Self-Harm and Suicide
a. Content promoting self-harm.
b. Pro-eating disorder content ("pro-ana").
c. Suicide promotion or instructions.
d. Content glorifying dangerous behaviors.
e. Materials encouraging self-destructive acts.
8. Misinformation and Deceptive Practices
8.1 Misrepresentation and Deception
a. Impersonating individuals or organizations.
b. Fraudulent schemes and scams.
c. False claims of expertise in sensitive areas.
d. Misleading claims about governmental or democratic processes.
e. Deceptive health-related information.
8.2 AI Content Disclosure Requirements
a. All content using AI assistance must be clearly disclosed, including:
i. Fully AI-generated content.
ii. Content created with AI assistance or augmentation.
iii. Hybrid content combining AI and human creation.
iv. Content edited or modified by AI tools.
b. The extent and nature of AI involvement must be accurately represented.
c. Misrepresenting AI-generated content as human-created is prohibited.
8.3 Harmful Misinformation
a. Spreading verifiably false statements that could harm public health or safety.
b. Promoting conspiracy theories leading to real-world harm.
c. Encouraging distrust in legitimate public services via fabricated data.
9. Sexual Content
a. Pornographic materials.
b. Explicit sexual acts.
c. Nudity.
d. Commercial adult content.
e. Links to adult websites violating the above standards.
10. Spam and Unwanted Content
10.1 Spam and Unsolicited Content
a. Bulk unsolicited messages.
b. Automated content generation that floods or clutters the platform.
c. Repetitive posting.
d. Unwanted commercial content (marketing spam).
e. Mass solicitations.
f. Unsolicited mass email.
g. Deceptive promotions or advertisements.
h. Distribution of hoaxes.
i. Pyramid schemes.
10.2 Platform Misuse
a. Using services as content distribution networks for unsolicited or malicious purposes.
b. Excessive bandwidth usage beyond normal operations.
c. Automated account creation at scale.
d. AI-generated content violating terms.
11. Violent Organizations
11.1 Terrorist Content
a. Terrorist organization materials.
b. Violent extremist content.
c. Recruitment materials.
d. Terrorist manuals or instructions.
e. Content celebrating attacks.
f. Violent ideology promotion.
12. Additional Provisions
12.1 Platform Integrity
a. All content must remain accessible for a minimum of 24 hours after posting unless:
i. Removed for policy violations.
ii. Removed at the request of law enforcement.
iii. Removed due to valid copyright claims.
b. Activities that undermine trust or stability of our Services are grounds for immediate enforcement.
c. Sites or services enabling black-market transactions or linking to external illicit marketplaces are prohibited.
d. Publishing private info or inciting real-world harm is strictly banned.
e. You must promptly notify us of any unauthorized access, data breach, or suspicious system activity involving content on our platform.
12.2 User Acknowledgement of Terms
a. By continuing to use the Services, you confirm you have read, understood, and agreed to all provisions.
b. Disclaimers of liability do not exempt you from responsibility.
13. Violations and Enforcement
13.1 Investigation and Action
a. We may investigate suspicious behavior or content.
b. We reserve the right to remove content, suspend, or terminate accounts without prior notice if there's a risk to public safety, legal compliance, or platform integrity.
c. We may refer suspected illegal or unauthorized activities to law enforcement.
13.2 Appeals Process
a. Appeals must be submitted within 30 days of enforcement action.
b. Appeals will be reviewed within 5 business days and enforcement actions remain in effect during review.
c. One appeal per enforcement action is permitted unless new evidence is presented.
d. Appeals decisions are final unless significant new information becomes available.
14. Contact and Updates
a. Contact: If you see possible violations or have questions about this Policy, please contact hello@zarla.com
b. Policy Changes: We may modify this Policy at any time. Updates become effective immediately upon posting.
c. Your continued use of the Services indicates acceptance of the revised terms.
15. Versioning
Current Version: Version 1.0
Effective Date: January 16, 2025