Back to home

Acceptable Use Policy

Last updated: January 2026

This Acceptable Use Policy ("AUP") outlines the rules and guidelines for using Turalogin's authentication services. By using our services, you agree to comply with this policy.

1. Purpose

This policy is designed to protect Turalogin, our customers, and the broader internet community from irresponsible or illegal activities. Violations of this policy may result in suspension or termination of your account.

2. Prohibited Activities

You may not use Turalogin to:

2.1 Illegal Activities

  • Engage in any activity that violates applicable laws or regulations
  • Facilitate fraud, identity theft, or financial crimes
  • Distribute illegal content or materials
  • Violate export control laws or sanctions

2.2 Harmful Content

  • Distribute malware, viruses, or other harmful code
  • Host phishing pages or deceptive content
  • Distribute content that promotes violence, hatred, or discrimination
  • Distribute child sexual abuse material (CSAM)

2.3 Abuse of Service

  • Attempt to gain unauthorized access to our systems or other users' accounts
  • Circumvent rate limits, security measures, or access controls
  • Use automated systems to send spam or unsolicited messages
  • Interfere with the proper functioning of the service
  • Perform denial-of-service attacks or similar disruptive activities

2.4 Intellectual Property Violations

  • Infringe on copyrights, trademarks, or other intellectual property rights
  • Use Turalogin branding or trademarks without permission
  • Reverse engineer, decompile, or disassemble our software

2.5 Privacy Violations

  • Collect personal information without proper consent
  • Use the service to track or surveil individuals without authorization
  • Violate data protection laws such as GDPR or CCPA

3. Email Usage Requirements

Since Turalogin sends authentication emails on your behalf, you must ensure:

  • You have permission to send emails to the addresses you authenticate
  • Your users have opted in to receive authentication communications
  • You comply with anti-spam laws (CAN-SPAM, CASL, etc.)
  • You do not use the service to send bulk marketing emails

4. Security Requirements

You are responsible for:

  • Keeping your API keys secure and confidential
  • Implementing proper security measures in your applications
  • Promptly rotating API keys if they are compromised
  • Reporting security vulnerabilities to us responsibly

5. Resource Usage

You must use the service within reasonable limits:

  • Respect rate limits and quotas for your subscription plan
  • Do not attempt to circumvent usage limitations
  • Implement proper error handling and retry logic
  • Cache responses where appropriate to reduce unnecessary requests

6. Monitoring and Enforcement

We reserve the right to:

  • Monitor usage for compliance with this policy
  • Investigate suspected violations
  • Remove or disable access to content that violates this policy
  • Suspend or terminate accounts that violate this policy
  • Report illegal activities to appropriate authorities

7. Reporting Violations

If you become aware of any violation of this policy, please report it to us at:

  • Email: abuse@turalogin.com

We will investigate all reports and take appropriate action.

8. Consequences of Violation

Violations of this policy may result in:

  • Warning and request to cease the activity
  • Temporary suspension of service
  • Permanent termination of your account
  • Legal action if warranted

9. Changes to This Policy

We may update this Acceptable Use Policy from time to time. Material changes will be communicated to users through email or dashboard notifications.

10. Contact Us

If you have questions about this policy, please contact us at:

  • Email: legal@turalogin.com