Acceptable Use Policy
Rules against account abuse, trial abuse, infrastructure abuse, resale, and risky use.
Last updated: May 14, 2026Purpose
This Acceptable Use Policy protects PolySocket.dev, customers, infrastructure, payment systems, and market participants from abuse. It applies to all accounts, trials, subscriptions, API keys, WebSocket connections, and customer systems connected to PolySocket.dev.
Account and trial abuse
- Do not create multiple accounts to obtain extra free trials, evade limits, bypass payment requirements, or avoid prior cancellations.
- Do not use aliases, multiple emails, card rotation, VPN/proxy rotation, device changes, business-name changes, or related-user accounts to bypass one-trial restrictions.
- Do not share login credentials, API keys, or customer dashboard access outside your own organization.
Infrastructure abuse
- Do not overload, stress test, scan, attack, scrape, reverse engineer, or attempt to bypass WebSocket, authentication, billing, wallet, or rate-limit controls.
- Do not use PolySocket.dev to transmit malware, spam, credential attacks, denial-of-service traffic, or automated abusive traffic.
- Do not attempt to access another customer's account, API keys, data, subscriptions, or feed access.
Market and trading abuse
- Do not use PolySocket.dev to engage in unlawful trading, market manipulation, fraud, wash trading, spoofing, deceptive conduct, sanctions evasion, or activity that violates applicable market, exchange, platform, or legal rules.
- You are responsible for your own trading system, wallets, signatures, orders, risk controls, compliance obligations, and use of Polymarket or any other venue.
- PolySocket.dev may suspend accounts that create legal, compliance, fraud, infrastructure, payment, or reputational risk.
Resale and commercial services
- Personal and standard subscription plans may not be resold, sublicensed, rented, shared, or used to provide customer-facing commercial feed access.
- Copy-bot services, signal products, hosted trading services, reseller use, managed customer access, or public redistribution require written permission or an enterprise commercial-use plan.
- Enterprise terms may include custom limits, additional controls, data-use rules, and commercial permissions.
Enforcement
- We may throttle, block, suspend, terminate, revoke keys, cancel subscriptions, deny refunds, preserve evidence, and refuse future service for suspected violations.
- We may apply enforcement immediately when needed to protect infrastructure, payments, customers, or legal compliance.
- Violations of this policy may also violate the Terms of Service and Billing Policy.
