Acceptable Use Policy
Effective date: February 11, 2026
This Acceptable Use Policy ("AUP") describes what you can and cannot do with the memex.email service ("Service"). This policy is part of our Terms of Service. Violating this policy may result in suspension or termination of your access.
We wrote this policy to be clear and specific. If something is not covered here and you are unsure whether it is permitted, contact us at abuse@memex.email before proceeding.
1. No Spam or Bulk Unsolicited Email
The Service is designed for legitimate email communication. You may not use it to:
- Send unsolicited bulk email (spam) to or through Memex tag addresses
- Create tags for the purpose of collecting email addresses for unsolicited outreach
- Use the forwarding feature to relay spam or unsolicited marketing to tag members
- Add people as tag members without their knowledge or consent for the purpose of sending them unsolicited messages
- Use automated tools to create tags or send messages in bulk without authorization
Legitimate mailing lists, team distribution lists, and notification routing are welcome uses of the Service. The distinction is consent: all recipients should expect and want the messages they receive.
2. No Malware or Malicious Content
You may not use the Service to:
- Distribute viruses, trojans, ransomware, or any other malicious software
- Send phishing emails or messages designed to deceive recipients into revealing credentials or personal information
- Host or link to malicious payloads through message content or attachments
- Use tag addresses as command-and-control channels for botnets or compromised systems
- Conduct denial-of-service attacks against the Service or any third party through the Service
3. No Impersonation
You may not use the Service to:
- Create tags or namespaces that impersonate another person, company, or organization
- Register namespaces using trademarks or brand names you do not own or have rights to use
- Forge email headers or manipulate message metadata to misrepresent the origin of a message
- Create tags that are misleadingly similar to official channels of organizations you are not affiliated with
Using your own name, your organization's name, or generic descriptive terms for tags is fine. Claiming to be someone you are not is not.
4. No Illegal Content
You may not use the Service to store, transmit, or facilitate the distribution of:
- Child sexual abuse material (CSAM) or any content that exploits minors
- Content that violates applicable laws in your jurisdiction or ours
- Stolen data, trade secrets, or content obtained through unauthorized access to computer systems
- Content that facilitates terrorism, human trafficking, or other serious criminal activity
- Content that infringes on intellectual property rights where no fair use or other exception applies
We will report suspected CSAM to the National Center for Missing and Exploited Children (NCMEC) and cooperate with law enforcement as required by law.
5. Rate Limits and Fair Use
To ensure the Service remains reliable for all users, we enforce rate limits and fair use guidelines:
- Message volume: Tags are subject to rate limits on inbound messages. The specific limits depend on your plan and may change as the Service evolves. We will publish current limits in our documentation.
- Tag creation: There are limits on how many tags a single user can create within a given time period to prevent automated abuse.
- Storage: Tags are subject to storage limits for archived messages and attachments. Retention policies help manage storage use over time.
- API usage: If and when we provide APIs, they will be subject to rate limits documented in the API reference.
If your legitimate use case requires higher limits, contact us. We are happy to work with you on a plan that fits your needs.
6. Infrastructure Integrity
You may not:
- Attempt to gain unauthorized access to the Service, other users' data, or our infrastructure
- Probe, scan, or test the vulnerability of the Service without our written permission
- Circumvent or attempt to circumvent rate limits, access controls, or other security measures
- Interfere with or disrupt the Service for other users
- Reverse-engineer, decompile, or disassemble any part of the Service
- Use the Service in a way that generates excessive load on our infrastructure relative to the value provided
If you discover a security vulnerability, please report it responsibly to security@memex.email. We appreciate and will acknowledge responsible disclosure.
7. Enforcement
We take a graduated approach to enforcement. The severity of the response depends on the nature and severity of the violation:
First or minor violations
We will notify you of the violation and ask you to correct it. You will have a reasonable period to comply.
Repeated or serious violations
We may temporarily suspend your access to the Service or disable specific tags. You will be notified and can contact us to discuss remediation.
Severe or unresolvable violations
We may permanently terminate your access and delete your tags. This is reserved for serious abuse, illegal activity, or repeated violations after warnings.
In cases involving illegal content (particularly CSAM), active security threats, or ongoing harm to other users, we may skip the warning step and act immediately. We will always provide an explanation of our decision.
If you believe an enforcement action was taken in error, you may appeal by contacting abuse@memex.email. We will review your appeal and respond within 10 business days.
8. Reporting Abuse
If you encounter content or behavior on the Service that violates this policy, please report it to abuse@memex.email. When reporting, please include:
- The tag address or namespace involved
- A description of the violation
- Any relevant evidence (message headers, screenshots, etc.)
- Your contact information so we can follow up if needed
We review all abuse reports and will respond within 5 business days. For urgent matters involving immediate harm or illegal activity, please indicate the urgency in your subject line.
9. Changes to This Policy
We may update this Acceptable Use Policy from time to time. When we make material changes, we will update the effective date and notify active users. Your continued use of the Service after changes take effect constitutes acceptance of the revised policy.
10. Questions
If you have questions about what is or is not permitted under this policy, contact us at abuse@memex.email. We would rather answer questions upfront than enforce rules after the fact.