Acceptable Use Policy

Last Updated: February 17, 2026

This Acceptable Use Policy ("AUP" or "Policy") governs the use of the Agent Midas platform, website, APIs, applications, and all related services (collectively, the "Platform") operated by Buji Development Corporation, a Wyoming corporation with its principal office at 1712 Pioneer Ave. Ste. 500, Cheyenne, WY 82001 ("Company," "we," "us," or "our"). By accessing or using the Platform, you agree to comply with this Policy. This AUP is incorporated by reference into the Agent Midas Terms of Service and applies to all users, subscribers, developers, affiliates, and any other individuals or entities that access the Platform.

1. Purpose

The purpose of this Acceptable Use Policy is to establish clear standards of conduct for all users of the Agent Midas platform and to protect the security, integrity, availability, and reputation of the Platform and its community. This Policy is designed to ensure that the Platform remains a safe, reliable, and professional environment for all participants, including subscribers, developers contributing through the Developer OS Program, affiliates, and end users.

This Policy sets forth the minimum standards of acceptable behavior. The Company reserves the right to take action against any conduct that, in its sole judgment, is harmful to the Platform, its users, or the Company's business interests, even if such conduct is not explicitly enumerated in this Policy. All users are expected to exercise good judgment, act in good faith, and comply with applicable laws and regulations in addition to the requirements of this Policy.

2. General Standards

2.1 Professional Use

The Agent Midas platform is designed for professional and business purposes, including cryptocurrency market analysis, AI-powered trading intelligence, portfolio analytics, and related financial technology applications. Users shall use the Platform in a manner consistent with these purposes and shall not use the Platform for any purpose that is illegal, fraudulent, deceptive, or harmful to others.

2.2 Compliance with Laws

Users must comply with all applicable local, state, national, and international laws, regulations, and rules in connection with their use of the Platform. This includes, without limitation:

  • Securities laws and regulations, including those governing trading, market manipulation, and insider trading
  • Anti-money laundering (AML) and know-your-customer (KYC) regulations
  • Economic sanctions and export control laws administered by OFAC, BIS, or equivalent authorities
  • Data protection and privacy laws, including GDPR, CCPA/CPRA, and applicable state privacy laws
  • Intellectual property laws, including copyright, trademark, patent, and trade secret protections
  • Consumer protection laws and regulations governing fair business practices

2.3 Respect for Others

Users shall treat all other Platform participants with respect and professionalism. This includes refraining from harassment, bullying, intimidation, discrimination, hate speech, threats of violence, or any other conduct that creates a hostile environment for other users. Users shall not impersonate other individuals or entities, misrepresent their identity or affiliations, or engage in deceptive practices that may mislead other users or the Company.

3. Prohibited Content

Users may not upload, post, transmit, share, or otherwise make available through the Platform any content that falls into the following categories:

3.1 Illegal Content

  • Content that violates any applicable law, regulation, or legal obligation
  • Content that facilitates, promotes, or instructs others in illegal activities, including but not limited to money laundering, tax evasion, or securities fraud
  • Content related to the sale, distribution, or promotion of controlled substances, illegal weapons, or other contraband
  • Content that constitutes or facilitates market manipulation, wash trading, front-running, or other prohibited trading practices

3.2 Harmful Content

  • Content that promotes or incites violence, terrorism, self-harm, or harm to others
  • Content that constitutes harassment, bullying, threats, intimidation, or hate speech targeting individuals or groups based on race, ethnicity, national origin, religion, gender, sexual orientation, disability, or any other protected characteristic
  • Content containing or distributing child sexual abuse material (CSAM) or any content that exploits minors
  • Content that is defamatory, libelous, or constitutes an invasion of another person's privacy

3.3 Infringing Content

  • Content that infringes, misappropriates, or violates any third party's copyright, trademark, patent, trade secret, or other intellectual property rights
  • Content that violates any third party's right of publicity or right of privacy
  • Unauthorized copies of copyrighted software, media, or other protected works

3.4 Deceptive Content

  • False, misleading, or fraudulent information, including fabricated financial data, fake testimonials, or misleading performance claims
  • Phishing content designed to deceive users into disclosing personal information, credentials, or financial data
  • Impersonation of other users, the Company, its employees, or any other individuals or entities
  • Misleading claims regarding investment returns, trading performance, or the capabilities of the Platform

3.5 Malicious Content

  • Viruses, worms, trojans, ransomware, spyware, adware, or any other malicious software or code
  • Scripts or tools designed to exploit vulnerabilities in the Platform or its users' systems
  • Content designed to disable, overload, impair, or disrupt the functionality of the Platform or its infrastructure

4. Prohibited Activities

4.1 Unauthorized Access

Users shall not attempt to gain unauthorized access to any part of the Platform, other users' accounts, computer systems, or networks connected to the Platform. Prohibited activities include, but are not limited to:

  • Accessing or attempting to access accounts, data, or systems without authorization
  • Circumventing, disabling, or interfering with any security features, access controls, or authentication mechanisms of the Platform
  • Using credentials, API keys, or access tokens belonging to another user without their explicit authorization
  • Probing, scanning, or testing the vulnerability of the Platform or any related system or network without written authorization from the Company
  • Interfering with or disrupting the integrity or performance of the Platform or its underlying infrastructure

4.2 Reverse Engineering

Users shall not reverse engineer, decompile, disassemble, decode, or otherwise attempt to derive the source code, underlying algorithms, data models, or proprietary methodologies of the Platform or any component thereof. This prohibition extends to any AI models, trading algorithms, scoring systems, signal generation logic, or other proprietary technology used in connection with the Platform. Users shall not attempt to reconstruct or replicate the functionality of the Platform's proprietary features through observation, testing, or analysis of Platform outputs.

4.3 Scraping and Data Harvesting

Users shall not use any automated means, including but not limited to web scrapers, crawlers, bots, spiders, or data mining tools, to access, collect, extract, or download data from the Platform without the Company's prior written consent. This includes scraping of market data, analytics, user profiles, content, pricing information, or any other data available on or through the Platform. Users shall not aggregate, republish, resell, or redistribute Platform data without authorization.

4.4 Abuse of AI Features

Users shall not misuse the AI-powered features of the Platform, including but not limited to:

  • Attempting to extract, reconstruct, or reverse-engineer the training data, model weights, or system prompts of AI systems used by the Platform
  • Using AI features to generate content that violates this Policy, including deceptive, harmful, or infringing content
  • Submitting adversarial inputs, prompt injections, or jailbreak attempts designed to circumvent AI safety measures or elicit prohibited outputs
  • Using AI outputs from the Platform to train competing AI models or services without the Company's written consent
  • Misrepresenting AI-generated content as human-created, or human-created content as AI-generated, in contexts where such distinction is material
  • Overloading AI processing features through excessive, automated, or abusive request patterns

4.5 Spam and Unsolicited Communications

Users shall not use the Platform to send unsolicited commercial messages, spam, chain letters, pyramid schemes, or any other form of unsolicited communication. Users shall not use the Platform's communication features or contact information obtained through the Platform to send bulk messages, advertise third-party products or services, or engage in any form of commercial solicitation not authorized by the Company. Affiliate marketing activities must comply with the Agent Midas Affiliate Agreement and applicable FTC guidelines.

5. Platform Integration Rules

5.1 API Usage

Users who access the Platform through APIs must comply with the following requirements:

  • API keys and access tokens are personal and non-transferable. Users must not share, publish, or expose API credentials to unauthorized parties
  • API usage must be consistent with the documentation provided by the Company and limited to the functionality described therein
  • Users must implement proper error handling and respect HTTP status codes, retry-after headers, and other API response signals
  • API integrations must identify themselves through proper user-agent strings or headers as specified in the API documentation

5.2 Rate Limits

The Platform enforces rate limits on API requests to ensure fair access and system stability. Rate limits vary by subscription tier and endpoint. Users must comply with the following:

  • Do not exceed the rate limits associated with your subscription tier. Rate limit headers are included in API responses for monitoring purposes
  • Implement exponential backoff when receiving rate limit responses (HTTP 429)
  • Do not attempt to circumvent rate limits through the use of multiple accounts, API keys, IP addresses, or other evasion techniques
  • Contact the Company at [email protected] if your use case requires higher rate limits than those provided by your subscription tier

5.3 Data Handling

Users who receive data through the Platform or its APIs are responsible for handling such data in compliance with applicable laws, including data protection regulations. Specifically:

  • Data received from the Platform may be used only for the purposes authorized by the user's subscription agreement
  • Users must implement appropriate security measures to protect any data received from the Platform
  • Users must not store, cache, or replicate Platform data beyond what is necessary for their authorized use and must respect any data retention limitations specified in the API documentation
  • Users must delete cached or stored Platform data promptly upon termination of their subscription or upon the Company's request

6. Enforcement

6.1 Detection Methods

The Company employs a combination of automated and manual methods to detect violations of this Policy, including but not limited to:

  • Automated monitoring systems that detect anomalous usage patterns, excessive API requests, and suspicious account activity
  • AI-powered content moderation systems that analyze user-submitted content for policy violations
  • Manual review by trained personnel in response to user reports, automated alerts, or routine audits
  • Third-party security tools and threat intelligence services
  • Community reporting mechanisms allowing users to flag potential violations

6.2 Graduated Enforcement Actions

The Company applies a graduated approach to enforcement, taking into account the severity and frequency of violations, the user's history of compliance, and the potential for harm. Enforcement actions include:

LevelActionDescription
1WarningWritten notice identifying the violation and requiring corrective action within a specified timeframe. The user's account remains active during the remediation period.
2SuspensionTemporary restriction or suspension of the user's access to all or part of the Platform. Suspension duration is determined based on the severity of the violation and may range from 24 hours to 30 days.
3TerminationPermanent termination of the user's account and all access to the Platform. Termination may be imposed immediately for severe violations without prior warning or suspension.

6.3 No Refunds for Violations

Users whose accounts are suspended or terminated due to violations of this Policy are not entitled to any refund of subscription fees, prepaid credits, or any other payments made to the Company. Any outstanding affiliate commissions, bounty payments, or other amounts owed to the user may be withheld or forfeited at the Company's discretion in cases of material or repeated violations.

6.4 Immediate Action

The Company reserves the right to bypass the graduated enforcement process and take immediate action, including immediate account termination, in cases involving:

  • Illegal activity or content, including any activity that may expose the Company to criminal or civil liability
  • Security threats that pose an imminent risk to the Platform, its users, or its infrastructure
  • Distribution of malware or malicious code
  • Severe harassment, threats of violence, or content that exploits minors
  • Fraudulent activity, including identity theft, payment fraud, or deliberate misrepresentation

7. Right to Decline Service

The Company reserves the right, at its sole discretion, to decline service to any individual or entity for any reason, or for no reason, to the extent permitted by applicable law. Without limiting the generality of the foregoing, the Company may decline to provide service to individuals or entities that:

  • Are located in, or are nationals or residents of, countries or territories subject to comprehensive U.S. economic sanctions (including, but not limited to, Cuba, Iran, North Korea, Syria, and the Crimea, Donetsk, and Luhansk regions of Ukraine)
  • Are listed on any U.S. government restricted party list, including the OFAC Specially Designated Nationals and Blocked Persons List (SDN List), the Bureau of Industry and Security Entity List, or equivalent lists
  • Have previously been terminated from the Platform for violations of this Policy or the Terms of Service
  • Present an unacceptable risk of harm to the Platform, its users, or the Company's business reputation, as determined by the Company in its reasonable judgment
  • Fail to provide requested identity verification, KYC documentation, or other compliance information

The Company's decision to decline service is final and may be made without providing a detailed explanation to the applicant or user, except as required by applicable law.

8. Reporting Violations

8.1 How to Report

If you become aware of any violation of this Policy, or if you believe that any content or activity on the Platform violates this Policy, applicable law, or the rights of any third party, please report it immediately to our abuse team:

8.2 Information to Include

To help us investigate and respond to your report effectively, please include the following information where available:

  • Your name and contact information
  • A detailed description of the alleged violation
  • The date and time the violation occurred or was observed
  • The username, account identifier, or other identifying information of the user responsible for the violation
  • URLs, screenshots, logs, or other evidence supporting the report
  • The section(s) of this Policy that you believe have been violated

8.3 Investigation and Response

The Company will acknowledge receipt of all violation reports within two (2) business days and will investigate each report in a timely and thorough manner. The Company will take appropriate enforcement action as described in Section 6 where violations are confirmed. Due to privacy and confidentiality obligations, the Company may not be able to disclose the specific actions taken against another user in response to a report.

8.4 Good Faith Reporting

The Company encourages good-faith reporting of potential violations and will not take adverse action against users who submit reports in good faith. However, the Company reserves the right to take action against users who submit false, frivolous, or malicious reports intended to harass other users or interfere with the Company's operations.

8.5 Law Enforcement Cooperation

The Company cooperates with law enforcement authorities in the investigation of violations that may constitute criminal offenses. The Company may report suspected criminal activity to the appropriate law enforcement agencies and may disclose user information to law enforcement in response to valid legal process, including subpoenas, court orders, and search warrants, or where the Company reasonably believes disclosure is necessary to prevent imminent harm to any person.

Contact Information

For questions about this Acceptable Use Policy:

Buji Development Corporation
1712 Pioneer Ave. Ste. 500
Cheyenne, WY 82001
Email: [email protected]
Web: www.agentmidas.xyz

To report violations: [email protected]