← Back to Legal Documents
        Acceptable Use Policy
VFT Chain LLC
Effective Date: October 29, 2025
Version: 1.0
Last Updated: October 29, 2025
IMPORTANT NOTICE
This Acceptable Use Policy (AUP) defines permitted and prohibited uses of the VFTChain platform and VFTC tokens. Violations may result in account termination, legal action, and criminal prosecution.
Contact: Thomas@vftchain.com
1. Purpose and Scope
1.1 Policy Purpose
This AUP protects:
- VFTChain platform integrity and security
 
- Other users' safety and rights
 
- VFT Chain LLC's legal compliance obligations
 
- Public trust in decentralized compute systems
 
- Platform reputation and viability
 
1.2 Scope
This policy applies to:
- All VFTChain platform users (compute providers and customers)
 
- VFTC token holders and participants
 
- All platform-related activities and transactions
 
- Off-platform behavior affecting VFTChain community
 
1.3 Incorporation
This AUP is incorporated into and forms part of the Terms of Service. Violation of this AUP constitutes breach of Terms of Service.
2. Permitted Uses
2.1 Platform Services
VFTChain may be used for:
Legitimate Compute Workloads:
- Data processing and analytics
 
- Machine learning and AI model training/inference
 
- Scientific computing and simulations
 
- Video/image rendering and transcoding
 
- Cryptographic computations (non-mining)
 
- Software compilation and testing
 
- Database queries and operations
 
- General-purpose computing tasks
 
Blockchain Operations:
- VFTC token transfers and transactions
 
- Smart contract interactions (VFTChain platform contracts)
 
- Wallet management and operations
 
- Participation in platform governance (when available)
 
Platform Participation:
- Providing compute resources (GPU/CPU)
 
- Purchasing compute services with VFTC tokens
 
- Testing and reporting bugs
 
- Contributing to open-source components
 
- Participating in community discussions
 
2.2 Acceptable Content
Users may process data that is:
- Legally obtained and rightfully owned
 
- Public domain or properly licensed
 
- Subject to valid use rights or permissions
 
- Compliant with applicable laws and regulations
 
- Non-infringing of third-party rights
 
2.3 Business Use
Platform may be used for commercial purposes:
- Commercial AI/ML applications
 
- Enterprise computing workloads
 
- Startups and small business computing
 
- PROVIDED: All legal and ethical requirements are met
 
3. Prohibited Uses
3.1 Illegal Activities
STRICTLY PROHIBITED - ZERO TOLERANCE:
Criminal Activities:
- Money laundering or terrorist financing
 
- Fraud, theft, or embezzlement
 
- Hacking, unauthorized access, or computer crimes
 
- Distribution of child sexual abuse material (CSAM)
 
- Human trafficking or exploitation
 
- Drug trafficking or illegal substance distribution
 
- Weapons trafficking or prohibited arms dealing
 
- Sanctions evasion (OFAC violations)
 
- Tax evasion or financial crimes
 
- Identity theft or impersonation
 
- Extortion, blackmail, or ransomware operations
 
- Any activity that violates criminal law in any jurisdiction
 
Immediate Consequences:
- Instant account termination
 
- Asset forfeiture (tokens and funds)
 
- Report to law enforcement (FBI, Secret Service, Interpol, etc.)
 
- Civil and criminal prosecution
 
- Permanent ban from all VFT Chain LLC services
 
3.2 Prohibited Content
Content that is PROHIBITED on platform:
Child Exploitation:
- Child sexual abuse material (CSAM) in any form
 
- Child exploitation or grooming content
 
- Any content sexualizing minors
 
- ZERO TOLERANCE - Immediate report to NCMEC and law enforcement
 
Illegal Content:
- Pirated software, movies, music, or media
 
- Stolen data or credentials
 
- Malware, viruses, or exploit code (unless legitimate security research)
 
- Hacking tools designed for unauthorized access
 
- Counterfeit documents or currency
 
- Controlled substance production information (e.g., meth labs, fentanyl synthesis)
 
Violent or Harmful Content:
- Terrorist propaganda or recruitment materials
 
- Violent extremism or calls for violence
 
- Torture or execution videos (unless newsworthy/journalistic)
 
- Detailed instructions for violence or terrorism
 
- "How-to" guides for suicide or self-harm
 
Intellectual Property Infringement:
- Copyright-infringing materials (piracy)
 
- Trademark-infringing content
 
- Patent-infringing processes
 
- Trade secret theft or misappropriation
 
- Unauthorized commercial use of protected works
 
Privacy Violations:
- Non-consensual intimate images ("revenge porn")
 
- Doxing (publishing private information to harass)
 
- Stalking or harassment content
 
- Illegally obtained private data (hacked databases, etc.)
 
3.3 Prohibited Activities
The following activities are PROHIBITED:
Abuse and Harassment:
- Bullying, harassment, or intimidation of other users
 
- Hate speech or content targeting protected characteristics (race, religion, gender, orientation, disability, etc.)
 
- Threats of violence or harm
 
- Coordinated harassment campaigns
 
- Sexual harassment or unwanted advances
 
Platform Abuse:
- Sybil attacks (creating multiple fake accounts)
 
- Automated bot networks for farming rewards
 
- Wash trading or market manipulation
 
- Exploiting bugs or vulnerabilities for personal gain (report bugs responsibly instead)
 
- Denial-of-service (DoS) attacks against platform or users
 
- Spamming or flooding platform with fake transactions
 
- Phishing or social engineering attacks against users
 
- Impersonating VFT Chain LLC employees or officials
 
Compute Abuse:
- Cryptocurrency mining (Bitcoin, Ethereum, etc.) without explicit permission
 
- Using platform for attacks against third parties
 
- DDoS attack coordination or command & control
 
- Botnet operations or zombie computer networks
 
- Brute-force password cracking (except authorized penetration testing)
 
- Scanning or probing third-party networks without authorization
 
- Hosting or distributing malware
 
Token Abuse:
- Wash trading VFTC tokens to create fake volume
 
- Market manipulation or price fixing
 
- Front-running or insider trading
 
- Using stolen funds to purchase tokens or services
 
- Mixing or tumbling tokens from illicit sources
 
- Sanctions evasion via token transfers
 
Security Violations:
- Attempting to hack or breach platform security
 
- Reverse engineering to discover vulnerabilities (report responsibly instead)
 
- Social engineering of employees or users
 
- Credential stuffing or account takeover attempts
 
- Exploiting zero-day vulnerabilities before responsible disclosure
 
- Distributing or selling platform exploits
 
3.4 Sanctioned Jurisdictions and Entities
PROHIBITED - OFAC Compliance:
- Any transactions involving sanctioned countries: Cuba, Iran, North Korea, Syria, Crimea, Donetsk, Luhansk
 
- Transactions with individuals or entities on OFAC SDN list
 
- Providing services to sanctioned persons or entities
 
- Using VPN/proxy to circumvent geographic restrictions
 
- 50% rule violations (transacting with entities owned 50%+ by sanctioned persons)
 
Penalties:
- Immediate account suspension and asset freeze
 
- Report to OFAC within 10 days
 
- Civil penalties up to $20 million per violation (OFAC)
 
- Criminal prosecution (up to 30 years imprisonment)
 
3.5 Prohibited Industries (Without Proper Licensing)
The following uses require explicit permission and appropriate licenses:
- Adult content or pornography (even if legal)
 
- Gambling or online casinos
 
- Cannabis industry operations (even in legal jurisdictions)
 
- Weapons manufacturing or sales
 
- Pharmaceutical production or distribution
 
- Financial services (money transmission, exchange operations)
 
Reason: High regulatory risk and compliance complexity. May be permitted with proper licensing, legal review, and enhanced due diligence.
4. Security Requirements
4.1 User Security Obligations
Users MUST:
- Secure private keys and credentials properly
 
- Use strong, unique passwords (12+ characters, mixed case, numbers, symbols)
 
- Enable two-factor authentication (2FA) where available
 
- Keep software and wallets updated
 
- Use reputable, secure wallet providers
 
- Report security vulnerabilities responsibly
 
- Monitor account activity for suspicious behavior
 
Users MUST NOT:
- Share account credentials with others
 
- Use the same password across multiple services
 
- Store private keys in plaintext or unsecured locations
 
- Fall for phishing attempts (verify all URLs and emails)
 
- Use public WiFi without VPN for platform access
 
- Access platform from compromised or shared computers
 
4.2 Responsible Disclosure
If you discover security vulnerability:
- Report immediately to: Thomas@vftchain.com (subject: "Security Vulnerability")
 
- Provide detailed description, proof-of-concept (if applicable), and suggested fix
 
- Do NOT publicly disclose vulnerability until we've had reasonable time to fix (90 days)
 
- Do NOT exploit vulnerability beyond minimal testing needed to confirm
 
- Participate in bug bounty program (if rewards offered)
 
Responsible disclosure = NO PROSECUTION (Safe Harbor)
Irresponsible disclosure or exploitation = Legal action
5. Data and Privacy
5.1 Data Processing
Users who process data on platform MUST:
- Have legal right to process the data
 
- Comply with data protection laws (GDPR, CCPA, etc.)
 
- Obtain necessary consents from data subjects
 
- Not process sensitive personal data without proper safeguards
 
- Comply with data residency and cross-border transfer laws
 
- Implement appropriate security for data
 
Sensitive Data (requires enhanced protection):
- Personally identifiable information (PII)
 
- Protected health information (PHI) under HIPAA
 
- Financial account data (PCI-DSS compliance if payment card data)
 
- Children's data (COPPA compliance in U.S.)
 
WARNING: VFTChain does NOT guarantee GDPR, HIPAA, or PCI-DSS compliance. Users processing regulated data must conduct their own compliance assessment.
5.2 Privacy Violations
Do NOT process data obtained via:
- Unauthorized scraping or harvesting
 
- Violation of terms of service of source platforms
 
- Non-consensual surveillance
 
6. Intellectual Property
6.1 Copyright Compliance
Users MUST:
- Respect copyright and only process lawfully obtained content
 
- Have proper licenses for commercial software, media, datasets
 
- Comply with fair use limitations (if applicable)
 
- Remove infringing content upon valid DMCA takedown notice
 
Users MUST NOT:
- Upload or process pirated movies, software, music, books, etc.
 
- Circumvent DRM or technological protection measures
 
- Distribute content without proper licensing
 
- Use platform to host or distribute copyrighted works without permission
 
6.2 DMCA Takedown Procedure
Copyright owners may submit DMCA takedown notices to:
Email: Thomas@vftchain.com
Subject: "DMCA Takedown Request"
Must include:
- Identification of copyrighted work infringed
 
- Identification of infringing material and its location on platform
 
- Copyright owner contact information
 
- Statement of good faith belief that use is unauthorized
 
- Statement of accuracy under penalty of perjury
 
- Signature of copyright owner or authorized representative
 
Response:
- Content removed within 24-48 hours if valid notice
 
- User may file counter-notice if believes removal was erroneous
 
6.3 Trademark Compliance
Users MUST NOT:
- Use VFTChain trademarks in domain names or business names without permission
 
- Create confusion about affiliation with VFT Chain LLC
 
- Use trademarks in misleading or disparaging manner
 
- Imply endorsement or partnership without authorization
 
Acceptable use:
- Factual references to VFTChain platform
 
- Nominative use (e.g., "I use VFTChain for compute")
 
7. Enforcement and Penalties
7.1 Violation Detection
We detect violations via:
- Automated monitoring and AI-based content screening
 
- User reports and complaints
 
- Law enforcement referrals
 
- Security audits and manual reviews
 
- Blockchain analysis and transaction monitoring
 
7.2 Enforcement Actions
Penalties for violations (severity-based):
Minor Violations (first-time, low severity):
- Temporary suspension (24-72 hours)
 
- Mandatory compliance training
 
Moderate Violations (repeat or medium severity):
- Account suspension (7-30 days)
 
- Asset freeze during investigation
 
- Forfeiture of rewards or earnings
 
- Permanent monitoring of account
 
Severe Violations (illegal, harmful, or zero-tolerance):
- Immediate permanent account termination
 
- Complete asset forfeiture (tokens and funds)
 
- Report to law enforcement
 
- Civil lawsuit for damages
 
- Criminal prosecution referral
 
- Permanent ban from all VFT Chain LLC services
 
7.3 Appeals
Users may appeal enforcement actions:
- Submit written appeal to Thomas@vftchain.com within 14 days
 
- Provide evidence and explanation
 
- Compliance team reviews within 10 business days
 
- Decisions are final and binding
 
NO APPEALS for:
- CSAM violations (child exploitation)
 
- OFAC sanctions violations
 
- Terrorism or violent extremism
 
- Other zero-tolerance violations
 
7.4 Repeat Offenders
Escalating penalties:
- 1st violation: Warning or temporary suspension
 
- 2nd violation: Longer suspension + monetary penalties
 
- 3rd violation: Permanent termination + full asset forfeiture
 
7.5 Asset Forfeiture
Forfeited assets may be:
- Burned (tokens permanently destroyed)
 
- Returned to victims (if identifiable)
 
- Retained by VFT Chain LLC to offset damages
 
- Turned over to law enforcement
 
No refunds or compensation for forfeited assets.
8. User Reporting
8.1 Reporting Violations
To report AUP violations:
Email: Thomas@vftchain.com
Subject: "AUP Violation Report"
Include:
- Evidence (screenshots, transaction IDs, wallet addresses, etc.)
 
- Your contact information (optional but helpful)
 
Anonymous reports accepted (but may be harder to investigate)
8.2 Report Types
Priority reporting for:
- Child sexual abuse material (CSAM) - IMMEDIATE RESPONSE
 
- Terrorism or violent extremism
 
- Ongoing security breaches or attacks
 
Standard reporting for:
- Copyright infringement (DMCA takedowns)
 
- Harassment or abusive behavior
 
- Terms of Service violations
 
8.3 Whistleblower Protection
Reporters protected from:
- Retaliation by reported users
 
- Account termination for good-faith reporting
 
- Liability for mistaken reports (if made in good faith)
 
NOT protected from:
- Consequences of own violations
 
- False reports made maliciously
 
- Harassment of other users via reporting system
 
9. Platform Monitoring and Data Retention
9.1 Monitoring
We may monitor:
- Public blockchain transactions (VFTC token transfers, smart contract calls)
 
- Metadata of compute jobs (size, duration, resource usage)
 
- User communications with support
 
- IP addresses and geolocation
 
- Wallet addresses and blockchain activity
 
We do NOT monitor:
- Content of encrypted compute jobs (we cannot access)
 
- Private wallet activities off-platform
 
- User communications outside platform
 
9.2 Data Retention
We retain for compliance and legal purposes:
- Transaction records: 5 years minimum
 
- AML/sanctions screening results: 5 years
 
- User reports and investigations: 7 years
 
- CSAM reports: Indefinite (National Center for Missing & Exploited Children retention)
 
- Legal holds: Duration of investigation/litigation + 7 years
 
9.3 Cooperation with Law Enforcement
We fully cooperate with:
- Valid subpoenas, warrants, and court orders
 
- National security letters (NSLs) when legally compelled
 
- Emergency requests (imminent danger)
 
- International law enforcement (via MLAT or similar treaties)
 
Information provided may include:
- User account information and activity logs
 
- Transaction records and blockchain data
 
- IP addresses and geolocation data
 
- Content (if we have access)
 
- Metadata and timing information
 
10. Third-Party Services and Links
10.1 Third-Party Integrations
VFTChain may integrate with third-party services:
- We do NOT control third-party services
 
- Third-party terms and policies apply
 
- We are NOT responsible for third-party actions or violations
 
- Users must comply with third-party AUPs
 
Examples:
- Solana blockchain (Solana Foundation TOS applies)
 
- IPFS/Filecoin storage (Protocol Labs TOS applies)
 
- Wallet providers (wallet TOS applies)
 
- Cloud infrastructure (AWS AUP applies)
 
10.2 External Links
Platform may contain links to external websites:
- We do NOT endorse linked content
 
- External sites have own policies and terms
 
- We are NOT responsible for external content or violations
 
- Access third-party sites at own risk
 
10.3 User-Generated Content
User-generated content (forum posts, comments, etc.):
- Users are solely responsible for their content
 
- We may moderate or remove violating content
 
- We are NOT liable for user content (Section 230 protection)
 
- Posting content does NOT transfer ownership to us
 
11. Updates and Modifications
11.1 Right to Update
We may update this AUP:
- To address new threats or abuses
 
- To comply with new laws or regulations
 
- To clarify ambiguous provisions
 
- To expand or restrict permitted uses
 
11.2 Notice
Material changes communicated via:
- Website notice (30 days minimum)
 
- Email notification (if email provided)
 
- Update to "Last Updated" date
 
11.3 Continued Use
After updates:
- Continued platform use = acceptance of updated AUP
 
- If you disagree, you must stop using platform immediately
 
- No refunds for terminating use due to AUP changes
 
12. Geographic and Jurisdictional Provisions
12.1 Regional Restrictions
Certain features or uses may be restricted based on:
- Local laws and regulations
 
Users responsible for:
- Complying with laws in their jurisdiction
 
- Understanding local restrictions
 
- Not using VPN/proxy to circumvent geographic restrictions
 
12.2 Conflicts of Law
If local law conflicts with this AUP:
- More restrictive law applies
 
- Users must comply with both
 
- If compliance is impossible, platform use prohibited in that jurisdiction
 
13. Miscellaneous
13.1 Entire Agreement
This AUP, together with Terms of Service and other legal documents, constitutes entire agreement regarding acceptable use.
13.2 Severability
If any provision is invalid, remaining provisions remain in effect.
13.3 No Waiver
Failure to enforce any provision does NOT waive right to enforce later.
13.4 Assignment
Users may NOT assign or transfer account or rights under AUP. VFT Chain LLC may assign to affiliates or acquirers.
14. Contact Information
For AUP questions or violation reports:
VFT Chain LLC
c/o Corporation Service Company
251 Little Falls Drive
Wilmington, DE 19808
United States
Email: Thomas@vftchain.com
For URGENT security or CSAM reports:
Email: Thomas@vftchain.com
Subject: "URGENT: [Issue Type]"
15. Acknowledgment
By using VFTChain platform, you acknowledge that you:
- Have read and understood this Acceptable Use Policy
 
- Agree to comply with all provisions
 
- Understand violations may result in termination and prosecution
 
- Accept all monitoring and enforcement actions
 
- Will not engage in any prohibited activities
 
- Will report violations you observe
 
- Understand this is a legally binding agreement
 
FAILURE TO COMPLY WITH THIS AUP MAY RESULT IN CRIMINAL PROSECUTION, CIVIL LIABILITY, AND PERMANENT BAN FROM PLATFORM.
Last Updated: October 29, 2025
Version: 1.0
Document ID: VFTC-AUP-2025-v1.0
© 2025 VFT Chain LLC. All rights reserved.
Use VFTChain responsibly and legally. We have zero tolerance for abuse.