Acceptable Use Policy

Last updated April 11, 2023

This Acceptable Use Policy ("Policy") is designed to protect the integrity, reliability and stability of the networks, systems, applications, and related services of RevOptimal, LLC (the “Services”), is part of our Terms of Use ("Terms"), and should therefore be read alongside our Terms available at https://revoptimal.com/terms. If you do not agree with these Terms, please refrain from using our Services. Your continued use of our Services implies acceptance of these Terms.

Please carefully review this Policy which applies to any and all:

  1. uses of our Services (as defined in " Terms")
  2. forms, materials, consent tools, posts, and all other content available on the Services ("Content")

When you use the Services, you warrant that you will comply with this Policy and with all applicable laws.

You also acknowledge that you may not:

  • Systematically retrieve data or other content from the Services to create or compile, directly or indirectly, a collection, compilation, database, or directory without written permission from us.
  • Make any unauthorized use of the Services, including collecting usernames and/or email addresses of users by electronic or other means for the purpose of sending unsolicited email, or creating user accounts by automated means or under false pretenses.
  • Circumvent, disable, or otherwise interfere with security-related features of the Services, including features that prevent or restrict the use or copying of any Content or enforce limitations on the use of the Services and/or the Content contained therein.
  • Engage in unauthorized framing of or linking to the Services.
  • Trick, defraud, or mislead us and other users, especially in any attempt to learn sensitive account information such as user passwords.
  • Make improper use of our Services, including our support services or submit false reports of abuse or misconduct.
  • Engage in any automated use of the Services, other than authorized API usage, such as using scripts to send comments or messages, or using any data mining, robots, or similar data gathering and extraction tools.
  • Interfere with, disrupt, or create an undue burden on the Services or the networks or the Services connected.
  • Attempt to impersonate another user or person or use the username of another user.
  • Use any information obtained from the Services in order to harass, abuse, or harm another person.
  • Use the Services as part of any effort to compete with us
  • Decipher, decompile, disassemble, or reverse engineer any of the software comprising or in any way making up a part of the Services, except as expressly permitted by applicable law.
  • Attempt to bypass any measures of the Services designed to prevent or restrict access to the Services, or any portion of the Services.

Ready to supercharge your ROAS?