Terms of Acceptable Use

Terms of Acceptable Use

Last Updated: April 23, 2026

These Terms of Acceptable Use (“TOAU”) apply to all users of the Services made available by QR TIGER PTE. LTD. (“QR TIGER,” “QR TIGER,” “we,” “us,” or “our”), including customers, authorized users, administrators, developers, and any other person accessing or using the Services. These TOAU are incorporated into, and form part of, the QR TIGER Terms and Conditions and any applicable Order Form or separate agreement governing the Services.

A violation of these TOAU is a violation of your agreement with QR TIGER. We may investigate violations and may suspend, restrict, disable, or terminate access to the Services, remove or disable content, or take any other remedial action permitted by law or contract, with or without notice, where we reasonably determine that doing so is necessary to protect the Services, our users, third parties, or QR TIGER.

1. General Principle

To keep the Services secure, reliable, lawful, and available for all users, you may not, and may not permit, encourage, assist, or instruct any third party to use the Services in a prohibited manner.

2. Security and Platform Integrity

You must not:

(a) breach, bypass, defeat, disable, probe, scan, or test any authentication, security, integrity, or access-control measures relating to the Services or any related systems or networks;

(b) access, modify, search, scrape, monitor, extract, or use non-public areas of the Services except through publicly supported interfaces or as expressly authorized by QR TIGER in writing;

(c) reverse engineer, decompile, disassemble, decode, tamper with, or hack the Services;

(d) use spoofing, phishing, social engineering, credential theft, token theft, header manipulation, session hijacking, or similar techniques;

(e) interfere with, impair, or disrupt any host, network, user, system, API, infrastructure, database, communications channel, or security mechanism connected with the Services;

(f) overwhelm or attempt to overwhelm the Services by imposing an unreasonably large load, excessive API traffic, abusive automation, bulk account creation, denial-of-service techniques, or any behavior that consumes extraordinary resources beyond normal or documented use;

(g) introduce or transmit malware, ransomware, spyware, malicious code, bots, worms, Trojan horses, scripting exploits, or any similar harmful technology; or

(h) use the Services to conduct security attacks, benchmark availability or performance for competitive purposes, or facilitate abuse of another network, system, or service.

3. Illegal, Harmful, and Fraudulent Activity

You must not use the Services:

(a) for any illegal purpose or in violation of any applicable law, regulation, court order, sanctions regime, or governmental requirement;

(b) to commit fraud, impersonation, identity theft, deception, extortion, harassment, stalking, threats, or abuse;

(c) to engage in phishing, spoofing, misleading redirection, deceptive campaigns, fake identities, false affiliation claims, or concealment of the origin of any content, communication, or traffic;

(d) to promote or facilitate unlawful schemes, counterfeit goods, fraud, scams, malware distribution, or unlawful circumvention of legal requirements;

(e) in a way that is defamatory, libelous, obscene, hateful, violent, exploitative, discriminatory, or harmful to minors; or

(f) in any manner that infringes, misappropriates, or violates the rights of QR TIGER, another user, or any third party.

4. Communications, Marketing, and Content Abuse

You must not:

(a) generate, send, publish, route, or facilitate unsolicited, unauthorized, deceptive, or unlawful advertising, promotions, or commercial communications, including spam, phishing, or messages that violate anti-spam, privacy, consumer protection, or telecommunications laws;

(b) use the Services in a way that could impair QR TIGER’s ability or the ability of other customers to send lawful communications, including causing domains, IPs, URLs, or infrastructure to be blocked, blacklisted, throttled, or denied by third parties;

(c) send advertisements or promotions for goods or services without appropriate authorization, required disclosures, or a lawful basis where required by law;

(d) distribute malicious redirects, hidden destinations, bait-and-switch destinations, or deceptive routing logic through dynamic URLs, QR destinations, hosted pages, or connected domains; or

(e) use misleading metadata, hidden text, or deceptive content designed to manipulate recipients, platforms, or search visibility unlawfully.

5. Content and User Materials

You must not submit, upload, publish, display, share, store, or otherwise use through the Services any content, data, code, links, fonts, designs, media, templates, or other materials that:

(a) you do not have the legal right to use, display, process, distribute, or transmit;

(b) infringe or misappropriate copyrights, trademarks, trade secrets, privacy rights, publicity rights, or other intellectual property or personal rights;

(c) are unlawful, misleading, fraudulent, abusive, pornographic, obscene, harassing, threatening, hateful, violent, or otherwise objectionable;

(d) promote bigotry or hatred against a person or group based on race, ethnicity, nationality, religion, sex, gender identity, sexual orientation, age, disability, or similar protected status;

(e) contain malicious code, unauthorized scripts, embedded exploits, hidden redirects, or other harmful content;

(f) unlawfully collect, store, disclose, scrape, or exploit personal data or confidential information of other persons; or

(g) could reasonably expose QR TIGER, its users, or third parties to legal liability, reputational harm, infrastructure abuse, or security risk.

6. Fair Use; Capacity; Abuse of “Unlimited” Features

If your plan includes features described as “unlimited” or without fixed caps, you may not exploit those features far beyond normal, reasonable, intended, or documented use. QR TIGER may determine, acting reasonably, that use is abusive where it materially strains infrastructure, circumvents pricing logic, defeats plan design, creates disproportionate risk, or exceeds fair operational behavior.

Examples of prohibited conduct include:

(a) abnormal or abusive scan volumes generated through bots, self-triggering loops, or traffic laundering;

(b) bulk or automated account creation outside publicly supported workflows;

(c) excessive API calls, redirect traffic, or hosted content behavior that materially exceeds the intended plan design;

(d) using one account, workspace, or subscription to support unrelated third parties or to operate as a service bureau without written approval; and

(e) repeated or patterned conduct intended to avoid usage-based charges, plan upgrades, or other commercial terms.

7. Privacy, Personal Data, and Regulated Use

You must not:

(a) use the Services to process personal data without providing required notices and obtaining required consents or other lawful bases;

(b) upload or transmit Regulated Data, or use the Services in regulated or high-risk environments, without QR TIGER’s prior written approval and any required supplemental terms;

(c) use the Services for unlawful surveillance, tracking, profiling, or collection of personal data;

(d) collect, store, or share data about users of the Services except as permitted by your agreement with QR TIGER and applicable law; or

(e) use the Services in connection with activities requiring licensed professional judgment where an inaccurate, delayed, or unavailable output could reasonably cause significant harm, unless QR TIGER has expressly approved such use in writing.

8. Third-Party Rights and Platforms

You must not:

(a) violate any terms, rights, or technical restrictions of third-party platforms, domain registrars, hosting providers, payment processors, analytics providers, advertising networks, messaging providers, or similar third parties used in connection with the Services;

(b) use the Services to facilitate infringement or misuse of third-party platforms or infrastructure;

(c) represent that QR TIGER is affiliated with, endorsed by, certified by, or partnered with any third party when that is untrue; or

(d) upload or use third-party materials without all necessary permissions and licenses.

9. High-Risk and Prohibited Use Cases

Unless expressly approved in writing by QR TIGER, you may not use the Services:

(a) in any manner involving Protected Health Information or other regulated health data;

(b) as part of critical infrastructure, emergency response, life-support, safety-critical, or military decision-making systems;

(c) for illegal gambling, payday lending, or unlawful financial promotions;

(d) for political or electoral manipulation, unlawful lobbying communications, or targeted disinformation campaigns;

(e) to facilitate unlawful discrimination or unlawful bias against individuals or groups; or

(f) in any way that could reasonably create serious legal, physical, financial, or reputational harm because the Services were not designed, marketed, or contractually approved for that use.

10. AI-Powered Features

If QR TIGER makes AI-powered or machine-learning-enabled features available, you must not use them:

(a) to provide legal, medical, financial, or other licensed professional advice as a substitute for qualified human judgment;

(b) to make or directly facilitate automated decisions producing legal or similarly significant effects on individuals without all safeguards required by applicable law;

(c) to generate unlawful misinformation, disinformation, deepfakes, or fraudulent impersonation content;

(d) in healthcare, employment, education, credit, insurance, biometric identification, law enforcement, or other high-risk contexts unless expressly approved by QR TIGER in writing; or

(e) without appropriate human review where outputs may materially affect persons, rights, or compliance obligations.

QR TIGER may disclaim warranties, liability, support, and indemnity for AI-generated outputs to the fullest extent permitted by law and the applicable agreement.

11. Enforcement and Remedies

Without limiting any other rights or remedies, QR TIGER may, in its sole discretion acting reasonably and in good faith:

(a) investigate suspected violations of these TOAU;

(b) remove, disable, or block content, redirects, pages, or domains;

(c) throttle, suspend, restrict, or terminate accounts, users, integrations, APIs, or Services;

(d) require corrective action, information, cooperation, or remediation from you;

(e) report unlawful conduct to law enforcement, regulators, rights holders, service providers, or impacted third parties where appropriate; and

(f) preserve relevant information for investigative, legal, compliance, or security purposes.

QR TIGER is not obligated to monitor use of the Services, but may do so to protect the Services, enforce its agreements, comply with law, or investigate suspected abuse.

12. Reporting Violations

If you become aware of a violation of these TOAU, security abuse, or unlawful use of the Services, you must promptly notify QR TIGER at [email protected]

13. Survival and Interpretation

These TOAU supplement, and do not replace, the QR TIGER Terms and Conditions and any applicable Order Form or signed agreement. In the event of a conflict regarding acceptable use, safety, abuse prevention, or platform integrity, these TOAU will control unless a signed written agreement expressly states otherwise.