Zero Tolerance Abuse Policy

We treat all abuse reports concerning Softpal seriously and are dedicated to investigating all violations submitted to us. If you come across content on Softpal that you think violates our Terms of Service, please report a violation. After you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share. We may close your report without a response, if we believe that the reported instance does not amount to a violation.

Report Abuse

Types of Abuse

We have sorted various kinds of abuse into the following categories:

Spam, Malware and Phishing – Users are prohibited from using Softpal Services for the transmission of "junk mail", "spam", "chain letters", “phishing” or unsolicited mass distribution of email. An example of a phishing attempt is an email requesting you to reveal your credit card number to be eligible for a prize amount.

Promotes Hatred, Violence or Illegal/Offensive Activities– Transmission or publishing any content that (i) is unlawful, illegal, hateful, promotes racism or promotes discrimination or hatred based on ethnicity, and (ii) defames, abuses, harasses, stalks, threatens or otherwise violates privacy and other legal rights of others, are explicitly considered as prohibited activities by Softpal.

Sexually Explicit Material– Sexually explicit materials are those materials that contain adult or mature content. We do not authorize users to publish or transmit sexually explicit material using Softpal Services.

Child Exploitation– We have a zero tolerance policy towards content that exploits children. This means we will terminate the accounts of any user that we find sharing or publishing child abuse content. We will also report the content and its owner to law enforcement authorities.

Personal and Confidential Information – We do not allow use of Softpal services to publish personal and confidential information of persons that is not publicly accessible without their explicit consent. Examples of personal and confidential information are full name, phone number, address, social security number, credit card number, government issued identification card details and bank information.

Copyright infringement– Copyright infringement occurs when someone other than the copyright holder copies the “expression” of a work. If you discover that there has been copyright infringement by a Softpal user involving your work we will take necessary action as specified here.

Other Violations– If you believe that you have a violation to report, that does not fall within any of the categories mentioned above, you may choose this to report such violation. Please note that you will be required to provide a description of such violation for us to take an appropriate action

Actions which constitute abuse include, but are not limited to:
  •  Attempting to circumvent user authentication or security of any host, network, or account on Softpal systems or the Internet at large.
  •  Attempting, in any way, to restrict, inhibit, interfere with, or degrade or deny service to any user, any host or any server on the Internet.
  •  Falsifying, altering, or removing message headers.
  •  Violating the regulations, rules or policies applicable to any network, server, computer database, or web site that you access.
  •  Unauthorized port scanning. Using or distributing devices used for compromising security, such as password gatherers or password guessing programs, decoders, encryption circumvention devices, packet sniffers, unauthorized keystroke loggers, analyzers, cracking tools, or Trojan Horse programs.
  •  Posting inappropriate messages to USENET newsgroups, e.g. posting large numbers of unsolicited posts indiscriminately or posting encoded binary files to USENET newsgroups not specifically named for that purpose.
  •  Attempting to cancel, supersede, or otherwise interfere with email or USENET posts other than one’s own.
  •  Engaging in harassment, whether through language, frequency, or size of messages. Using an account at another service provider to promote a Softpal web site in an abusive manner.
  •  Using a Softpal account or network connection to collect replies to messages sent from another provider which violate these rules or those of that provider or to participate in an illegal scheme.
  •  Accessing any other person’s computer or computer system, network, software, or data without his or her knowledge and consent.
  •  Automated or manual generation of network traffic to simulate hits to blogs or other web-sites for reasons other than the good-faith intention of an Internet user to visit a web site to purchase goods or services or to obtain information, or with the intent to promote an unrelated web site. Examples: Click Fraud, Referrer Log Spamming, web-based comment spam.
  •  Configuring the Softpal service or any related equipment to access or use a static IP address or use any protocol other than dynamic host configuration protocol unless you have a Softpal service plan that expressly permits you to do so.
  •  Engaging in any activity which Softpal believes, in its sole judgment, to be in support of spamming or bulk e-mail activities, including forwarding or posting “chain letters” (multiple forwarding) of any type.
Transmission of Unsolicited Bulk E-Mail

Softpal does not authorize the use of its computer network to accept, transmit or distribute unsolicited bulk e-mail sent from the Internet to its customers. Softpal does not authorize the harvesting or collection of screen names from its equipment or customers for the purpose of sending unsolicited bulk e-mail. Softpal reserves the right to take all legal and technical steps available to prevent unsolicited bulk e-mail or other unauthorized e-mail from entering, utilizing or remaining within the Softpal system. Unauthorized use of the Softpal system in connection with the transmission of unsolicited bulk e-mail or counterfeit or misleading e-mail may result in substantial civil penalties against the sender, including those provided by the Washington Commercial Electronic Mail Act (Wash. Rev. Code Chapter 19.190 et seq.) and the federal Computer Fraud and Abuse Act (18 U.S.C. sections 1030 et seq.).

Anyone who believes there is a violation of the policies above is encouraged to direct that information to our Network Abuse department through our online form or at