Skip to content

Acceptable use policy

Last Modified: 2022-12-01

This Voyado Acceptable Use Policy (“AUP”) applies to the use of any product, service or website provided by us (the “Services”). This AUP is designed to ensure compliance with the laws and regulations that apply to the Voyado Service. This AUP also protects the interests of all of our customers and their end-customers, as well as our goodwill and reputation. These terms are vital for our provision of the Services and we cannot provide the Services unless you agree to them. By using the Services, you are agreeing to these terms. Any examples in this AUP are not exhaustive.

  1. Prohibited conduct
  2. Prohibited content
  3. Email/text message opt-out requirements
  4. Proper usage of the Services and API
  5. General terms and conditions

If you are using any of the Service, this AUP applies to you. All Customers agree to follow this AUP and are responsible for any violations. You are not allowed to assist or engage others in a way that would violate this AUP. We have the right, but not the obligation, to monitor or investigate your use of the Services to ensure compliance with this AUP and the Agreement by using methods we consider to be appropriate, such as complaint and email failure monitoring. We may also suspend or terminate your use of the Services pursuant to our Terms and Conditions for violations of this AUP. The restrictions herein apply regardless of your intent and whether or not you act intentionally or unintentionally.

We may update this AUP from time to time by posting an updated version and any such updates will be effective upon posting. Your continued use of the Services constitutes your acceptance of the modified AUP and you agree to review the AUP on a regular basis and always remain in compliance.

If you know of or suspect a violation of this AUP, you shall promptly notify us at

1. Prohibited conduct

You may not use the Services:

a. for any illegal, immoral or improper purpose or in any manner which contravenes applicable laws and codes, regulatory requirements or applicable industry standards (such as the guidelines published by the CTIA and the Mobile Marketing Association) of the applicable jurisdictions or allow any third party to do so.

b. to send spam or any unsolicited traffic to the Services. Spam can be in the form of bulk email/text messages or one to one commercial emails/text messages. Bulk email/text messages are spam when it is unsolicited. Unsolicited means the recipient has not granted verifiable permission for the message to be sent. Bulk means that the message is sent as part of a larger collection of messages that have substantively similar content.

c. in any way (directly or indirectly) to send, transmit, handle, distribute or deliver: (a) spam in violation of the (EU) 2016/679 (EU GDPR) or the United Kingdom General Data Protection Regulation, the CAN-SPAM Act, Canada’s Anti-Spam legislation, the Telephone Consumer Protection Act or any other applicable law or regulation; (b) collect contacts or send messages to an address obtained via Internet harvesting methods or any surreptitious methods (e.g., scraping or harvesting); © send messages to an address that is incomplete, inaccurate and/or not updated for all applicable opt-out notifications, using best efforts and best practices in the industry, (d) commercial electronic messages in violation of legislation (f) any message that violates the right(s) of others.

d. to offer products, services or content related to any of the following industries: multi-level marketing, credit repair and “get-out of debt” services, cryptocurrencies, selling “likes” or followers for social media platform, escort and dating services, lead generating opportunities, list brokers/list rental services or gambling products or services. e. Overwhelm our infrastructure or attempt to by imposing an unreasonably large load on the Services that consume extraordinary resources, such as (I) going beyond the use parameters for the Services or what could otherwise be reasonable expected, or (ii) using “robots”, “spiders”, “offline readers” or other automated systems to end more request messages to our servers than a person could reasonably send in the same period of time using a normal browser.

f. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled; Denial of Service (DoS)

g. You may not use the Service to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include: Unauthorized Access. Accessing or using the System without permission, including attempting to probe, scan, or test the vulnerability of the System or to breach any security or authentication measures used by the System. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route.

Tampering with, reverse-engineering, or hacking our services, circumventing any security or authentication measures, or attempting to gain unauthorized access to the services, related systems, networks, or data.

h. Reselling Voyado services, in whole or in part, to any entity or individual, without Voyado’s prior written consent, or misrepresenting your relationship with Voyado.

i. use the Services in a way that causes or may cause any of our IP addresses, domains, or customer domains to be blacklisted.

j. is not a good faith use of the Services, such as uploading contacts in excess of your current contact tier, emailing those contacts and then purging them shortly thereafter; and/or

k. authorize, permit, enable, induce or encourage any third party to do of any of the above.

2. Prohibited content

You may not use the Services to store, process, solicit, display, send or transmit:

a. Content that violates, encourages or furthers conduct that would violate any applicable laws or any content that may be described as obscene, indecent, defamatory, libellous, deceptive, fraudulent, pornographic, harmful to minors, threatening, excessively profane or otherwise objectionable material;

b. Content that infringes or misappropriates intellectual property rights, or otherwise violates a third party’s rights; b. Any of the following types of data or information: (a) any information defined under the GDPR, the United Kingdom General Data Protection Regulation or any other applicable data protection legislation as a “special category”; (b) medical records or health information, including Protected Health Information as defined in the Health Insurance Portability and Accountability Act; © any non-public government identification numbers or financial account information such as (i) passport numbers, driver’s license number or similar identifiers or (ii) financial account information including credit or debit card number; and (d) information related to children under the age of 13 (or in the EEA, under 16);

c. Content that includes malware, trojan horses, worms, spyware, ransomware or other malicious or harmful code;

d. You may not use any misleading or false names, addresses, email address, or subject line or impersonate others or falsely state or otherwise misrepresent your affiliation with any person, group or entity (including by “spoofing” “phising” manipulating headers etc.)

3. Email/text message opt-out requirements

You warrant that each email you send or is sent for you using the Services will contain: (a) header information that is not false or misleading; and (b) an advisement that the recipient may unsubscribe, opt-out or otherwise demand that use of its information for unsolicited, impermissible and/or inappropriate communication(s) as described in this AUP be stopped (and how the recipient can notify you that it wants to unsubscribe, opt-out, or stop this use of its information). These requirements may not apply if the email sent is a transactional email and these requirements are not otherwise required by law. You warrant that you will promptly comply with all opt-out, unsubscribe, "do not call" and "do not send" requests.

4. Proper usage of the Services and API

You will respect the limits that apply to your use of the Services as specified in the documentation for the Services made available by Voyado. If you use any of our developer tools, APIs or related software you must also comply with any instructions and restrictions for such.

You will only access (or attempt to access) our APIs by the means described in our API documentation. We may set and enforce limits on your use of our APIs (e.g. limiting the number of API requests that you may make) in our sole discretion. You agree not to circumvent any limitations documented with our APIs. We may monitor your use of our APIs for reasons including to improve our APIs and for compliance with these API Terms. We may suspend your access to our APIs without notice if we reasonably believe that you are in violation of these API Terms. Voyado may collect and use usage data and information related to your use of the APIs.

We may update or change these limitations by updating the pages, so we encourage you to review these pages periodically.

5. General terms and conditions

We may immediately suspend your access to the Service if you breach this AUP or don’t respond to us in a reasonable period after we’ve contacted you about a potential breach of this AUP. We may also suspend your access as we explain in our terms and conditions and, if you breach this AUP, we may terminate your license agreement for cause. You acknowledge we may disclose information regarding your use of any Services to satisfy any law, regulation, government request, court order, subpoena or other legal process. If we make this type of required disclosure we will notify you, unless we are required to keep the disclosure confidential.

We reserve the right, but is not obligated, to investigate any violation of this Policy or misuse of the Service. We reserve the right to remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with you for use of the Service. We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct. We further reserve all other rights.


This online publication is intellectual property of Voyado Lund AB. Its contents can be duplicated in part or whole, provided that a copyright label is visibly located on each copy and the copy is used in conjunction with the product described within this document.

All information found in these documents has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither Voyado Lund AB nor the authors shall be held liable for possible errors or the consequences thereof.

Software and hardware descriptions cited in these documents might be registered trademarks. All trade names are subject to copyright restrictions and may be registered trademarks. Voyado Lund AB essentially adheres to the manufacturer’s spelling. Names of products and trademarks appearing in this document, with or without specific notation, are likewise subject to trademark and trade protection laws and may thus fall under copyright restrictions.