Acceptable Use Policy
Last updated: February 18, 2026
This Acceptable Use Policy ("AUP") describes prohibited uses of the Checkpoint service (the "Service"). This AUP is part of and incorporated into our Terms of Service.
Violation of this policy may result in suspension or termination of your account.
1. Prohibited Content
You may not use the Service to create, store, share, or transmit content that:
- Is unlawful, fraudulent, or deceptive
- Infringes on intellectual property rights of any third party
- Contains malware, viruses, or other harmful code
- Contains personally identifiable information of others without their consent
- Is defamatory, harassing, threatening, or promotes violence
- Contains child sexual abuse material or exploits minors in any way
- Promotes discrimination based on race, gender, religion, nationality, disability, sexual orientation, or age
2. Prohibited Activities
Infrastructure Abuse
- Serve production traffic through tunnels (tunnels are for development and review purposes only)
- Host persistent websites, file sharing services, or proxy services
- Conduct cryptocurrency mining
- Consume excessive bandwidth or resources that degrade the Service for other users
- Circumvent tunnel limits, rate limits, or other usage restrictions
Security Violations
- Attempt to gain unauthorized access to the Service, other accounts, or connected systems
- Probe, scan, or test the vulnerability of the Service without prior written authorization
- Intercept, monitor, or forge network traffic
- Use the Service to launch denial-of-service attacks or other disruptive activities
- Distribute phishing content or attempt to steal credentials
Spam & Abuse
- Send unsolicited messages or communications through the Service
- Create accounts in bulk or through automated means for abusive purposes
- Use the Service to harvest email addresses or other personal information
- Impersonate another person or entity
Intellectual Property
- Use the Service to distribute pirated software, media, or other copyrighted material
- Circumvent digital rights management or copy protection mechanisms
- Use Checkpoint trademarks, logos, or branding without written permission
3. Tunnel-Specific Rules
Tunnels are designed for sharing development environments for review and feedback. The following additional rules apply:
- Ephemeral use: Tunnels are intended for temporary development sessions, not persistent hosting.
- No illegal content: Content served through tunnels must comply with applicable laws in your jurisdiction and the jurisdiction of your reviewers.
- Responsible sharing: When sharing a tunnel link, you are responsible for who can access it and the content they will see. Use access controls (passwords, permissions) where appropriate.
- No circumvention: Do not use tunnels to circumvent network restrictions, firewalls, or security controls in ways that violate the policies of your network or organization.
4. Reporting Violations
If you believe someone is violating this AUP, please report it to hello@checkpoint.build with as much detail as possible, including:
- The nature of the violation
- URLs or tunnel identifiers involved
- Screenshots or other evidence, if available
We review all reports and take appropriate action, which may include warning the user, disabling content, or terminating accounts.
5. Enforcement
We reserve the right to investigate and take action against violations of this AUP at our sole discretion. Actions may include:
- Issuing a warning
- Temporarily suspending access
- Permanently terminating your account
- Removing or disabling offending content or tunnels
- Reporting illegal activity to law enforcement
We may also cooperate with law enforcement if we believe a violation involves criminal activity.
6. Changes to This Policy
We may update this AUP from time to time. Material changes will be communicated through the Service or by email. Your continued use of the Service after changes take effect constitutes acceptance of the updated AUP.
7. Contact Us
If you have questions about this Acceptable Use Policy, contact us at:
Checkpoint Labs, LLC
Email: hello@checkpoint.build