Back to home

Acceptable Use Policy

This policy defines permitted and prohibited uses of Kodo.

Last updated: February 3, 2026

1. Purpose

Kodo is designed for legitimate business and operational use. You must use the service in a way that is lawful, secure, and respectful of others.

2. Prohibited Activities

  • Violating laws or regulations in your jurisdiction.
  • Infringing intellectual property, privacy, or other third-party rights.
  • Sending spam, phishing, scams, or deceptive communications.
  • Creating or distributing malware or malicious code.
  • Attempting unauthorized access to systems, accounts, or data.
  • Disrupting service availability (including abuse, scraping, or overload attacks).
  • Using the service to create, promote, or coordinate violence or exploitation.

3. Integration and Credential Responsibilities

You are responsible for all tokens, API keys, and credentials connected to your workspace. You must have authority to connect third-party services and comply with those services' terms.

4. Monitoring and Enforcement

We may investigate suspected violations and take appropriate action, including limiting, suspending, or terminating access, and reporting unlawful activity to relevant authorities when required.

5. Reporting Abuse

To report misuse or security issues, contact contact@kodoagent.com.

6. Changes to This Policy

We may update this policy to reflect product changes, legal requirements, or security needs. Updated versions will be posted with a revised effective date.

7. Contact

Red Impact LLC (doing business as Kodo)

30 N Gould St Ste R, Sheridan, Wyoming, 82801

Email: contact@kodoagent.com