This AUP sets rules for lawful, ethical use of NetTracker Pro services and prohibits use that constitutes interception, harassment, or other offences under applicable law, including the Cybercrimes (Prohibition, Prevention, etc.) Act, 2015.
2. Prohibited Activities (zero tolerance)
Intercept or monitor communications, messages, calls, chat apps, media, or other non-public transmissions of any person without a lawful basis (consent, legal authority, or employer authority for company-owned devices).
Stalk, harass, intimidate, threaten, coerce, defame, or intentionally cause emotional distress to any person.
Impersonate, forge, or use another person’s identity or credentials.
Bypass or attempt to circumvent consent, authentication, security controls, or carrier restrictions.
Use the Service to commit or assist in criminal activity (fraud, extortion, blackmail, unlawful surveillance).
Use the Service on devices you do not legally own or manage unless you maintain documented, verifiable consent.
Export, sell, or disclose tracked third-party content except as permitted under an explicit lawful process (consent/warrant/DPO review).
3. Required legal basis / evidence before monitoring
Before monitoring any target you must provide one of the following and retain it for the full legal retention period:
Parental monitoring: proof of legal guardianship (birth certificate, court order) for minors.
Employer monitoring: signed company device policy plus signed attestation that the targeted devices are company-owned and employees were notified in writing.
Third-party consent: explicit signed (electronic or paper) consent from the target specifying scope and duration of monitoring. Each consent must include identity of consenting party, scope, date/time, and an attached copy of the device identifier or phone number.
NetTracker will require submission of this evidence during onboarding for high-risk features; failure to provide will block use of those features.
4. Account verification & KYC
All accounts must complete identity verification (name, address, government ID) and, for enterprise accounts, corporate registration documents.
High-risk feature access (call recordings, carrier-level capture, chat app interception, live location) is restricted until enhanced KYC and documented lawful basis are provided.
5. Monitoring, Detection & Automated Controls
NetTracker will deploy automated detectors to flag patterns consistent with stalking, repeated geofence harassment, mass targeting, or other abusive behavior. Flagged accounts will be suspended pending manual review.
Rate limits and feature quotas apply; unusually high activity triggers review and temporary suspension.
6. Enforcement, preservation & cooperation
On suspected or confirmed violation, NetTracker may: suspend/terminate the account, block features, preserve logs, and notify authorities.
NetTracker will preserve all relevant logs and evidence upon receipt of a lawful request (warrant, court order) and will cooperate with law enforcement per the legal process. Preservation requests from law enforcement will be processed via the company’s legal team.
Users must report suspected misuse to abuse@nettracker.pro. Reports should include account ID, target number, description, and supporting documents.
7. Penalties
Violations will result in account suspension, termination, forfeiture of refunds, and civil/legal referral. NetTracker will pursue legal remedies where appropriate.
8. Changes
NetTracker may update this AUP; material changes will be communicated 30 days in advance.