Anti-Abuse Policy

Effective May 1, 2026

1. Purpose and Applicability

This Anti-Abuse Policy (“Policy”) describes conduct that DigitalStakeout Inc. (“DigitalStakeout,” “We,” “Us,” or “Our”) considers abuse of Our Services, Content, Subscriptions, and intellectual property. This Policy operationalizes and supplements the obligations and restrictions already set forth in Our Master Subscription Agreement (“MSA”), in particular Section 2 (Authorized Use and Eligibility), Section 3 (Know Your Customer), Section 4 (Right to Audit), Section 5 (Free Access Programs), Section 6.3 (Your Responsibilities), Section 6.4 (Usage Restrictions), Section 6.5 (Removal of Content), Section 8 (Fees and Payment), Section 10 (Confidentiality), Section 11 (Proprietary Rights and Licenses), Section 14 (Term and Termination), and Section 17.1 (Export Compliance).

This Policy applies to all parties that access or use the Services, Content, or DigitalStakeout intellectual property, including:

  • All current Customers and Subscribers under an MSA or Ordering Document
  • Users (as defined in the MSA), including employees, consultants, contractors, and agents of Subscribers
  • Free Services users, free trial registrants, and Beta Services participants (collectively, Free Access Programs participants)
  • Service Delivery Customers (MSPs, MSSPs, consultancies, and similar Subscribers using the Services to deliver services to third-party end customers under Tier 2 KYC pursuant to MSA Section 3.3)
  • Authorized Resellers, Premier Partners, and Elite Partners under a separate executed Partner Agreement
  • Any third party that accesses Services, Content, or DigitalStakeout-derived outputs through any of the foregoing

This Policy is incorporated by reference into the MSA, every Ordering Document, the Documentation, and the DigitalStakeout Partner Program agreements. In the event of any conflict between this Policy and the MSA or an Ordering Document, the order of precedence in MSA Section 17.3 controls.

2. Why This Policy Exists

DigitalStakeout sells Subscriptions sized and priced to specific customers, scopes, and use cases. When parties exceed that scope without authorization, share access outside their organization, repackage Our Services into their own commercial offerings, or represent themselves to the market as authorized to deliver DigitalStakeout-based solutions when they are not, the harm extends beyond Us. It harms customers who paid for the correct tier, partners who invested in formal authorization, and the integrity of the intelligence Our products produce.

This Policy names the patterns of abuse We see most often, so that compliant customers and partners have clear expectations and so that We can act decisively when those expectations are not met.

3. Prohibited Conduct

The following categories describe conduct that constitutes a material breach of the MSA, an Ordering Document, or a Partner Agreement, as applicable. The list is illustrative, not exhaustive. We reserve the right to determine, in Our sole discretion, whether specific conduct constitutes abuse under this Policy.

3.1 License Scope Stuffing

Using the Services, Content, or any Subscription to cover entities, brands, business units, geographies, monitored assets, agencies, or use cases beyond what is expressly named or quantified on the applicable Ordering Document. This conduct violates MSA Section 2.4(e) and Section 6.2 (Usage Limits), and includes without limitation:

  • Adding monitored entities, keywords, queries, domains, IP ranges, or assets beyond the contracted quantities
  • Extending coverage to subsidiaries, affiliates, portfolio companies, joint ventures, or related entities not named on the Ordering Document and not qualifying as an Affiliate under MSA Section 1
  • Using a single-agency, single-tenant, or single-business-unit Subscription to deliver coverage to multiple agencies, tenants, or business units
  • Applying a Subscription scoped to one geography, jurisdiction, or operating unit to additional geographies, jurisdictions, or units
  • Using a Subscription purchased for a defined use case (e.g., executive protection) for a different or broader use case (e.g., enterprise-wide GSOC)

3.2 Account Sharing Outside the Organization

Permitting access to the Services, Content, dashboards, alerts, exports, reports, or any DigitalStakeout-derived output by individuals or entities that are not Users under MSA Section 1 and Section 2.2 (Authorized Users). This conduct violates MSA Section 2.2 and Section 6.4(a), and includes without limitation:

  • Sharing User credentials, session tokens, MFA factors, or password vaults with anyone other than the assigned User
  • Granting access to consultants, contractors, or third parties who have not been provisioned as Users and who are not transacting business with the Subscriber within the meaning of MSA Section 1
  • Forwarding alerts, reports, dashboards, or exports to recipients outside the Subscriber’s organization, except as expressly authorized in the Ordering Document or Documentation
  • Reassigning a User identification to a new individual in any manner inconsistent with MSA Section 2.2(iii)
  • Operating shared, generic, or “team” accounts in lieu of named-User accounts where the Service supports per-User authentication

3.3 Bypassing Controls

Circumventing, disabling, or attempting to circumvent or disable any technical, contractual, or operational control on Our Services. This conduct violates MSA Section 6.2 (Usage Limits) and Section 6.4(g) and (h), and includes without limitation:

  • Exceeding seat limits, query volumes, alert quotas, ingestion volumes, retention windows, report counts, or other usage limits stated in the Ordering Document, Documentation, or Service tier definition
  • Defeating or evading rate limiters, throttles, IP allowlists, geofencing, MFA requirements, audit logging, or session controls
  • Sharing API keys, service account credentials, or OAuth tokens with non-Users, or routing API traffic for non-Users through a Subscriber’s authorized credentials
  • Operating multiple lower-tier Subscriptions across related entities or aliases for the purpose of avoiding a higher-tier Subscription, volume commitment, or feature gate
  • Scraping the user interface, automating the UI, or constructing unofficial integrations specifically to defeat documented entitlements or feature gating
  • Tampering with, suppressing, or falsifying logs, telemetry, or audit records that We rely on to verify compliance under MSA Section 4 (Right to Audit)

3.4 Unauthorized Resale, White-Labeling, and Service-Bureau Delivery

Reselling, sublicensing, redistributing, white-labeling, or otherwise making the Services, Content, or DigitalStakeout-derived outputs available to third parties as part of a commercial offering, without an executed Authorized Reseller, Premier Partner, or Elite Partner agreement that expressly covers the offering. This conduct is independently prohibited by MSA Section 2.4(b) and Section 6.4(b) and includes, without limitation:

  • Operating a managed security service, MSSP offering, GSOC-as-a-service, threat intelligence service, executive protection service, or similar offering on top of a direct end-customer Subscription, where the Subscriber’s customers receive the benefit of the Services, without satisfaction of the Tier 2 KYC requirements in MSA Section 3.3 (for Service Delivery Use) or an executed Partner Agreement (for resale, sublicense, white-label, or distribution)
  • Rebranding or removing DigitalStakeout branding from any offering or any other Service or output, and presenting the result as the Subscriber’s own product
  • Embedding alerts, reports, intelligence, graph data, or screenshots of the Services into deliverables sold or provided to the Subscriber’s clients, beyond the limited internal-use rights granted under the MSA
  • Acting as an undisclosed intermediary, fronting a Subscription on behalf of an undisclosed end customer that has not signed the MSA
  • Including Services or Content in any service-bureau or outsourcing offering prohibited by MSA Section 6.4(b)

For clarity, lawful Service Delivery Use by an MSP, MSSP, consultancy, or similar Subscriber that has satisfied the Tier 2 KYC requirements in MSA Section 3.3 is not prohibited by this Section 3.4. Resale, sublicense, white-label, and distribution arrangements are governed exclusively by an executed Authorized Reseller, Premier Partner, or Elite Partner agreement and the diligence required thereunder.

3.5 Unauthorized Bidding, Proposing, and Market Representation

Naming DigitalStakeout, identifying any of Our Services or products, citing Our pricing or capabilities, attaching Our materials, or otherwise representing that the proposing party is authorized to deliver DigitalStakeout-based solutions in connection with any Government Opportunity (as defined in MSA Section 1) or any of the following contexts, without satisfaction of the Tier 3 KYC requirements in MSA Section 3.4 — including an executed Partner Agreement covering the specific opportunity and a written deal registration approved by Us:

  • RFP, RFI, RFQ, ITB, BAA, IDIQ, GWAC, GSA Schedule, OASIS, SEWP, CIO-SP, blanket purchase agreement, task order, delivery order, or similar solicitation responses
  • Statements of work, teaming agreements, or subcontractor agreements with prime contractors
  • Federal, state, local, tribal, territorial, or international government bids, including bids submitted under set-aside, schedule, or vehicle programs
  • Marketing materials, capability statements, websites, or sales collateral that imply an authorized reseller, partner, OEM, or service provider relationship that does not exist
  • Listings on procurement portals, vendor registration systems, or marketplace catalogs that present the proposing party as a source of supply for DigitalStakeout Services

A direct end-customer Subscription does not, by itself, confer any right to bid, propose, or market DigitalStakeout Services to third parties in any Government Opportunity. Authorization to do so is governed exclusively by MSA Section 3.4 and the DigitalStakeout Partner Program.

3.6 Affiliate and Related-Entity Piggybacking

Extending the benefit of a Subscription to entities that are not the Subscriber and do not qualify as Affiliates under the MSA Section 1 definition (more than 50% common ownership or control). This conduct violates MSA Section 2.4(e) and includes without limitation:

  • Sister companies, portfolio companies, and partner organizations under common minority ownership
  • Newly acquired or divested entities, beyond the transition period (if any) expressly stated in the Ordering Document
  • Joint ventures, consortia, and special-purpose vehicles in which the Subscriber participates
  • Government agencies, departments, or component organizations that share infrastructure with the Subscriber but are separately constituted

3.7 Output Redistribution

Republishing, reselling, syndicating, or otherwise redistributing alerts, intelligence reports, feeds, or any other DigitalStakeout-derived output, beyond the rights expressly granted in the Ordering Document and Documentation. This conduct violates MSA Section 6.4(a), (b), and (k), and includes without limitation:

  • Posting Content or output to public channels, mailing lists, or threat intelligence sharing communities outside the Subscriber’s organization
  • Including Content or output in client-facing newsletters, briefings, or publications without an Ordering Document line item authorizing external distribution
  • Providing Content or output to a third party as part of a paid engagement, except in compliance with Section 3.4 of this Policy and MSA Section 3.3 (Tier 2 KYC) or an executed Partner Agreement
  • Training, fine-tuning, or seeding any model, dataset, or product with bulk-exported Content (see also Section 3.11 of this Policy)

3.8 Free Access Program Misuse

Using free trials, Free Services, or Beta Services (collectively, Free Access Programs under MSA Section 5) in a manner inconsistent with their stated purpose, or to evade the terms applicable to paid use. This conduct violates MSA Section 2.4(d) and Section 5.6 and includes without limitation:

  • Registering successive trials under different corporate identities, email domains, or aliases to extend free access
  • Using Free Access Programs for production workloads, client deliverables, or commercial offerings
  • Accessing Free Access Programs for benchmarking, competitive analysis, market research, journalism, or academic study, contrary to MSA Section 2.3 (Restricted Persons) and Section 6.4(m)
  • Staging production data, configurations, or integrations on Free Access Programs in lieu of executing a paid Ordering Document

3.9 Procurement Misrepresentation and KYC Misrepresentation

Providing inaccurate, incomplete, or misleading information at the point of purchase, renewal, scope expansion, KYC submission, or deal registration in order to qualify for pricing, tiering, or terms that the Subscriber would not otherwise be entitled to. This conduct violates MSA Section 3.6 (KYC Misrepresentation) and Section 12.2 (Your Continuing Representations), and includes without limitation:

  • Misstating organization size, employee count, agency count, monitored entity count, or revenue
  • Mischaracterizing the intended use case, end users, or end customers of the Subscription
  • Purchasing commercial pricing for a federal end use without acknowledging the FAR 12.211 / 12.212 and DFAR provisions in MSA Section 11.4
  • Purchasing single-tenant pricing for a multi-tenant deployment, or single-agency pricing for a multi-agency deployment
  • Failing to disclose Service Delivery Use that triggers Tier 2 KYC under MSA Section 3.3, or failing to disclose participation in a Government Opportunity that triggers Tier 3 KYC under MSA Section 3.4
  • Providing false, incomplete, or misleading information in any KYC submission, beneficial ownership disclosure, end-customer disclosure, or deal registration
  • Failing to update KYC representations within the period specified in MSA Section 2.5

3.10 Prohibited Use Disguised as Authorized Use

Using the Services for purposes that are independently prohibited by the MSA, while presenting the activity internally or externally as ordinary authorized use. This conduct violates MSA Section 2.3 (Restricted Persons), Section 2.4 (Authorized Use Cases), and Section 6.4 (Usage Restrictions), and includes without limitation:

  • Conducting criminal profiling, targeting, tracking, pattern-of-life development, or dossier surveillance on individuals, groups, locations, or events, contrary to MSA Section 2.4(a) and Section 6.4(i)
  • Accessing the Services as a competitor, researcher, market analyst, journalist, or academic, contrary to MSA Section 2.3(a)
  • Using the Services for benchmarking, competitive analysis, or to build a competing product, contrary to MSA Section 2.3(b) and Section 6.4(m)
  • Using the Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or material in violation of third-party privacy rights, contrary to MSA Section 6.4(c)
  • Permitting access by parties previously suspended, terminated, debarred, or excluded by Us, contrary to MSA Section 2.3(d)

3.11 Data Exfiltration for Derivative Products

Using the Services or Content as a source for building, training, seeding, or enriching any product, dataset, model, taxonomy, or platform that is offered, distributed, or used outside the Subscriber’s permitted internal use. This conduct violates MSA Section 2.4(f) and Section 6.4(j), (k), and (m), and includes without limitation:

  • Bulk-exporting Content, entity registries, threat actor data, taxonomy, graph schema, or correlation rules for use beyond the Subscription’s authorized scope
  • Training or fine-tuning machine learning models on Content or Service outputs
  • Seeding a competing or adjacent vendor’s platform with DigitalStakeout-derived data

3.12 Sanctions, Export, and Denied-Party Violations

Provisioning Users, granting access, or directing Service activity in any manner inconsistent with MSA Section 17.1 (Export Compliance), Section 2.3(c) (Restricted Persons — sanctions / denied parties), or with applicable U.S. or other sanctions, export control, or denied-party laws. This includes, without limitation, granting access to Users in or from any country, region, territory, or jurisdiction that is the subject of comprehensive U.S. sanctions or embargoes, or to parties named on any U.S. government denied-party, sanctions, or exclusion list (including those administered by OFAC, BIS, or the U.S. Department of State) at the time of access or use.

3.13 Audit Obstruction and False Attestation

Refusing to cooperate in good faith with any audit, usage verification, scope verification, or compliance review conducted under MSA Section 4 (Right to Audit); providing false or misleading attestations, declarations, or certifications; or tampering with, suppressing, deleting, or falsifying records that We rely on to verify compliance with the MSA, an Ordering Document, a Partner Agreement, or this Policy. Failure to cooperate with an audit conducted under MSA Section 4 constitutes audit obstruction and is an independent material breach of the MSA, the applicable Ordering Document, and any Partner Agreement, as expressly provided in MSA Section 4.5.

4. Reservation of Rights and Sole Discretion

We reserve the right to determine, in Our sole and reasonable discretion, whether conduct constitutes abuse under this Policy, what response is appropriate, and the order, timing, and combination of the responses described in Section 5 of this Policy. Nothing in this Policy limits any right or remedy available to Us under the MSA, an Ordering Document, a Partner Agreement, or applicable law, all of which are expressly preserved and cumulative.

5. Our Response

Our default approach is to engage first, give the Subscriber, User, or partner a reasonable opportunity to acknowledge the issue and bring conduct into compliance, and reserve more disruptive measures for cases where engagement does not resolve the conduct or where the conduct is willful, repeated, or materially harmful. We do not, however, commit to a fixed sequence. Depending on the facts, We may take any one or more of the following actions, in any order, in Our sole discretion:

  1. Written notice. Issue a written notice describing the conduct and requesting acknowledgment, remediation, or additional information.
  2. Cooperation request. Request reasonable cooperation in a usage or scope review under MSA Section 4.2 (Routine License and Scope Verification), including access to logs, configurations, and attestations.
  3. For-cause audit. Initiate a for-cause audit under MSA Section 4.3 where We have a reasonable, good-faith basis to suspect prohibited conduct, subject to the audit safeguards in MSA Section 4.4(h).
  4. Ordering Document for excess usage. Require the Subscriber to execute an Ordering Document for additional quantities of the applicable Services or Content, consistent with MSA Section 6.2, and to pay any invoice for excess usage in accordance with MSA Section 8.2.
  5. Targeted restriction. Disable or restrict specific Users, credentials, integrations, or features.
  6. Suspension. Suspend the Services in whole or in part, consistent with MSA Section 2.6 and the final sentence of MSA Section 6.4.
  7. Revocation of deal registration. Revoke deal registration approval under MSA Section 3.4 where the conduct involves a Government Opportunity.
  8. Termination. Terminate the MSA, an Ordering Document, or a Partner Agreement for cause, consistent with MSA Section 14.4.
  9. Audit cost recovery. Recover the costs of any for-cause audit that substantiates prohibited conduct, consistent with MSA Section 4.6.
  10. Other remedies. Pursue any other remedy available at law or in equity, including the equitable relief contemplated by MSA Section 10.2.

We reserve the right, in cases that in Our judgment threaten the security, integrity, or availability of Our Services, to suspend immediately and without prior notice, consistent with the final sentence of MSA Section 6.4 and the no-prior-notice for-cause audit provision in MSA Section 4.3.

6. Reporting Suspected Abuse

Customers, Users, partners, and third parties may report suspected violations of this Policy to abuse@digitalstakeout.com or legal@digitalstakeout.com. Reports should include the name of the relevant Subscriber or party (if known), a description of the conduct, and any supporting information the reporter is able to provide. We treat reports as Our Confidential Information under MSA Section 10 and do not disclose reporter identities except as compelled by law.

7. Updates to This Policy

We may update this Policy from time to time. The “Effective” date at the top of this Policy reflects the most recent change. Material changes will be communicated through Our standard customer and partner communications channels. Continued use of the Services after the effective date of an updated Policy constitutes acceptance of the updated Policy, consistent with the modification language in the MSA preamble.

8. Contact

DigitalStakeout Inc.
Attn: Legal Department
234 Morrell Road, Suite 360
Knoxville, TN 37919-5876 USA

abuse@digitalstakeout.com
legal@digitalstakeout.com