System Conduct
ACCEPTABLE USE (AUP).
Use of the RevStackr platform constitutes your absolute acceptance of this Acceptable Use Policy (AUP). We maintain institutional-grade standards to protect the deliverability and reputation of our ecosystem.
01 Zero Tolerance Spam Protocol
Revstackr maintains a zero-tolerance policy towards the sending of unsolicited commercial communications (Spam).
PECR & GDPR Compliance: You may only send marketing SMS or emails to individuals who have explicitly opted-in or have a valid "soft opt-in" status as defined by UK law. Cold outreach to purchased data lists or scraped directory data is strictly prohibited.
02 Prohibited Data Sources
You may not upload, store, or contact lists acquired via the following methods:
- Purchased Lists: Buying leads from any data broker or third party.
- Web Scraping: Harvesting emails or phone numbers from social media or public directories.
- Co-Registration: Lists where a user signed up for one site but was added to another without specific consent.
Revstackr reserves the right to request proof of consent for any contacts uploaded to the system.
03 Technical Performance Thresholds
We monitor outbound traffic health in real-time. If your account exceeds these thresholds, we reserve the right to pause sending capabilities:
Upstream Supremacy: If an upstream provider (HighLevel/Twilio) suspends your sub-account due to a policy violation, Revstackr is obligated to comply immediately and cannot override the suspension.
04 Prohibited Content (S.H.A.F.T.)
You may not use the platform to promote content related to S.H.A.F.T.:
This includes high-risk financial industries such as payday loans, MLM schemes, and gambling.
05 Enforcement & Fines
Termination: Severe or repeated violations result in immediate account termination without refund.
Carrier Fines: Any fines levied against Revstackr by carriers (Twilio, Mobile Operators) due to your traffic will be passed through and charged to your payment method on file.
06 Security & Harmful Activity
Users must not introduce malware, exploit system vulnerabilities, perform performance-degrading automated requests, or impersonate others to mislead message recipients.
