Acceptable Use Policy
1. Introduction and Purpose
This Acceptable Use Policy ("AUP") governs your use of the services provided by Browser.lol (operated by Zesiger.net Individual Enterprise). This AUP is incorporated into and forms part of our Terms of Service.
The purpose of this AUP is to ensure that all users can enjoy our Services in a safe, secure, and lawful manner. Violation of this AUP may result in suspension or termination of your account and access to our Services, and may expose you to civil and criminal liability.
We reserve the right to modify this AUP at any time. Your continued use of the Services following any changes indicates your acceptance of the modified AUP.
2. General Prohibitions
You agree not to use the Services to engage in, facilitate, or promote any of the following activities:
2.1. Illegal Activities
- Any activity that violates any applicable local, state, national, or international law or regulation
- Distribution of illegal content including child sexual abuse material (CSAM), terrorist content, or content that promotes or facilitates illegal activities
- Money laundering, fraud, embezzlement, or other financial crimes
- Trafficking in illegal drugs or controlled substances
- Weapons trafficking or illegal arms dealing
- Human trafficking or exploitation
- Identity theft or impersonation
- Copyright, trademark, or intellectual property infringement
2.2. Security Violations
- Unauthorized access to or use of data, systems, or networks (hacking)
- Distribution of malware, viruses, worms, trojans, ransomware, or other malicious code
- Conducting or facilitating network security attacks including DDoS attacks
- Port scanning, network probing, or vulnerability scanning of third-party systems without authorization
- Phishing, spoofing, or other social engineering attacks
- Circumventing authentication or security measures
- Intercepting or monitoring data without authorization
- Cryptojacking or unauthorized cryptocurrency mining
2.3. Abusive Behavior
- Harassment, threats, stalking, or intimidation of any person
- Publishing or distributing hate speech, discriminatory content, or content that incites violence
- Doxing (publishing private or identifying information without consent)
- Creating or distributing revenge pornography or non-consensual intimate images
- Cyberbullying or targeted harassment campaigns
- Impersonating another person or organization with intent to deceive or harm
2.4. Spam and Unsolicited Communications
- Sending unsolicited bulk email (spam)
- Operating email lists without proper consent and unsubscribe mechanisms
- Sending deceptive or fraudulent messages
- Participating in or facilitating referral spam or link farming
- Using our Services to harvest email addresses or other contact information
3. Service-Specific Prohibitions
3.1. Browser Workspace Abuse
- Using browser workspaces to conduct automated attacks or scanning of third-party websites or networks
- Deliberately attempting to overload or crash our infrastructure
- Using workspaces to proxy malicious traffic
- Attempting to bypass workspace isolation or access other users' workspaces
- Using workspaces for cryptocurrency mining without explicit authorization
- Creating excessive numbers of workspaces to abuse trial or free tier limits
- Circumventing session timeouts or resource limits through technical means
3.2. Account Abuse
- Creating multiple accounts to abuse trial periods, promotional offers, or bypass bans
- Selling, trading, or transferring accounts to third parties
- Sharing account credentials with unauthorized persons
- Using stolen payment methods or engaging in payment fraud
- Providing false or misleading registration information
- Creating accounts using automated means (bots) without authorization
3.3. API and Integration Abuse
- Exceeding rate limits or making excessive API calls to burden our infrastructure
- Attempting to reverse engineer, decompile, or extract source code from our Services
- Using our APIs in ways not documented or authorized
- Circumventing API authentication or access controls
- Scraping our website or services without permission
4. Network and Resource Usage
While we provide generous resource allocations, abuse of network or computational resources is prohibited. You agree to:
- Use resources only for legitimate purposes consistent with your subscription plan
- Not engage in activities that cause excessive bandwidth consumption
- Not run processes that monopolize CPU, memory, or storage resources to the detriment of other users
- Not use our Services as a proxy or VPN service for third parties without authorization
- Comply with bandwidth and usage limits specified in your subscription plan
We may implement technical measures to prevent resource abuse, including rate limiting, throttling, or temporary suspension of services. For details on resource limits, see our Fair Use Policy.
5. Content Restrictions
You are solely responsible for all content you access, create, transmit, or store using our Services. You agree not to use our Services to access, create, transmit, or store:
- Content that violates intellectual property rights, including pirated software, music, videos, or other copyrighted material
- Content that violates privacy rights or discloses confidential information without authorization
- Sexually explicit content involving minors or non-consensual sexual content
- Content promoting terrorism, violent extremism, or illegal organizations
- Deceptive or fraudulent content, including scams and pyramid schemes
- Content that violates export control laws or facilitates illegal weapons distribution
- Excessively violent or graphic content that serves no legitimate purpose
6. Privacy and Data Protection
When using our Services, you must comply with all applicable data protection and privacy laws, including GDPR and Swiss FADP. Specifically:
- Obtain appropriate consent before collecting or processing personal data of others
- Implement appropriate security measures to protect personal data
- Respect individuals' privacy rights and respond to their requests appropriately
- Not collect, use, or disclose personal data in ways that violate privacy laws or our Privacy Policy
- Not engage in unauthorized surveillance or tracking of individuals
7. Enforcement and Monitoring
7.1. Monitoring
While we respect user privacy and do not monitor the content of browser workspace sessions, we reserve the right to:
- Monitor network traffic patterns and resource usage to detect abuse
- Use automated systems to detect security threats and violations of this AUP
- Investigate suspected violations when we receive complaints or detect suspicious activity
- Cooperate with law enforcement and legal authorities as required by law
7.2. Consequences of Violations
If we determine that you have violated this AUP, we may take one or more of the following actions:
- Issue a warning and require you to cease the prohibited activity
- Temporarily suspend your account or access to specific Services
- Permanently terminate your account and access to all Services
- Remove or disable access to prohibited content
- Report violations to law enforcement or regulatory authorities
- Take legal action to recover damages or obtain injunctive relief
- Refuse to provide future services
The specific action taken will depend on the severity and frequency of the violation. We reserve the right to take immediate action without prior notice for severe violations such as illegal content distribution or security attacks.
7.3. Appeals Process
If your account is suspended or terminated for an alleged AUP violation and you believe this action was taken in error, you may appeal by contacting us at [email protected] within 14 days of the action. Include your account information and a detailed explanation of why you believe the action was incorrect. We will review your appeal and respond within a reasonable timeframe.
8. Reporting Violations
If you become aware of any violation of this AUP by another user, we encourage you to report it to us. Reports can be submitted to:
- Security Issues & Abuse: [email protected]
- Copyright Violations: [email protected]
- General Violations: [email protected]
Please include as much detail as possible, including:
- Description of the violation
- URLs, timestamps, or other identifying information
- Evidence of the violation (screenshots, logs, etc.)
- Your contact information for follow-up
All reports will be investigated promptly. We maintain confidentiality of reporters to the extent permitted by law. For more information, see our Report a Problem page.
9. Limitation of Liability
We are not liable for any damages or losses arising from:
- Your violation of this AUP or applicable laws
- Actions taken by us to enforce this AUP, including suspension or termination of services
- Third-party content or activities accessed through our Services
- Delays or failures in detecting or preventing AUP violations
You agree to indemnify and hold us harmless from any claims, damages, or expenses arising from your violation of this AUP. For complete limitation of liability terms, see our Terms of Service.
10. Modifications to this Policy
We reserve the right to modify this AUP at any time to reflect changes in technology, legal requirements, or our service offerings. Material changes will be communicated via:
- Email notification to registered users at least 30 days before changes take effect
- Notice posted on our website and in your account dashboard
- Update to the "Last Updated" date at the bottom of this page
Your continued use of the Services after changes take effect constitutes acceptance of the modified AUP. If you do not agree to the changes, you must discontinue use of the Services.
11. Contact Information
If you have questions about this Acceptable Use Policy, please contact us:
Email: [email protected]
Postal Address: Janis Zesiger, Mügeri 340, 5046 Schmiedrued, Switzerland
For full contact details, see our Imprint.
Last Updated: November 14, 2025