Acceptable Use Policy
Skip2 Networks, LLC Acceptable Use Policy -AUP.V1.20240902
This Acceptable Use Policy (“AUP”) outlines the prohibited uses of services provided by Skip2 Networks, LLC (“Skip2”, “we”, “us”, or “our”). This AUP is incorporated by reference into the Skip2 Terms of Service and applies to all users, customers, and third parties accessing or using Skip2’s services (“you” or “your”).
Skip2 may, but is not obligated to, investigate any actual, suspected, or alleged violation of this AUP. We reserve the right to take any action we deem appropriate, including suspension or termination of service.
1. Enforcement
Skip2 reserves the right, at our sole discretion, to investigate any suspected violation of this AUP or misuse of our services. If we determine that a violation has occurred or if your use of our services poses a risk to our infrastructure, users, or reputation, we may take one or more of the following actions, with or without prior notice:
Suspend or terminate your account temporarily or permanently;
Remove, block, disable access to, or modify any content or resources;
Restrict access to any part of our services;
Cooperate with law enforcement and regulatory authorities;
Initiate legal action to enforce our rights or seek remedies;
Notify affected third parties or the public if necessary.
Skip2 cooperates with law enforcement and reports illegal activity where required by law or deemed appropriate.
2. No Illegal, Offensive, or Fraudulent Content
You may not use the Services for any illegal, harmful, fraudulent, or infringing purpose, or to transmit, distribute, or store content that is illegal, harmful, fraudulent, or infringing. Some examples include, but are not limited to, the following:
Illegal or Fraudulent Use
Promotes or facilitates illegal activity, including fraud, scams, or the sale of counterfeit goods;
Violates any applicable law, regulation, or third-party rights, including copyright and privacy laws;
Involves unauthorized access to or use of data, systems, or networks.
Infringement or Privacy Violations
Infringes upon the intellectual property or proprietary rights of others;
Disseminates personal, sensitive, or confidential information without appropriate consent.
Offensive or Abusive Content
Is defamatory, libelous, harassing, threatening, or invasive of privacy;
Incites hatred, violence, discrimination, or harm against any individual or group;
Includes content relating to child sexual abuse material (CSAM), non-consensual intimate imagery, or bestiality.
Malware and Exploits
Distributes or facilitates the distribution of viruses, ransomware, trojans, rootkits, keyloggers, or bots;
Stores or serves dangerous files (even for research) without password protection and labeling.
False or Manipulated Content
Intentionally misleads or impersonates individuals or organizations;
Promotes disinformation or synthetic content (deepfakes, AI-generated likenesses) used to deceive or cause harm.
3. No System or Service Abuse
You may not use the Services to abuse or interfere with any system, network, or CDN infrastructure. Prohibited activities include, but are not limited to:
Denial of Service (DoS / DDoS): Generating excessive traffic or resource use that overwhelms a system or network;
Interference: Intentionally degrading or disrupting the performance of our services or third-party systems;
Abuse of CDN Functionality: Misusing caching, routing, or reverse proxy mechanisms to evade controls or hide malicious origin content;
Port or Network Scanning: Probing, scanning, or testing the vulnerability of any system or network without authorization;
Excessive Resource Consumption: Exceeding reasonable usage limits or consuming disproportionate network capacity;
Open Proxying or Relaying: Operating unsecured open proxies, relays, or similar services that mask traffic origin.
4. Examples of Prohibited Use
Some illustrative examples of activities that violate this policy include, but are not limited to:
Hosting or delivering fake virus warning pages or tech support scams;
Distributing copyrighted content such as movies or software without permission;
Harvesting personal data without proper notice or consent;
Using services to harass or defame individuals;
Publishing or linking to content that doxxes an individual;
Operating phishing pages that mimic login portals or financial institutions.
5. Contact Us
If you have any questions about this Acceptable Use Policy, please contact us at:
Skip2 Networks, LLC.
332 S Michigan Ave #5631 Suite 121
Chicago, IL, 60604
US
legal@skip2.net
ATTN: Legal AUP
To learn more about our policies and terms, please contact us via e-mail at security@skip2.net