ONLINE
Bento
HomeLegalAcceptable Use Policy
Legal policy

Acceptable Use Policy

Read the current policy, jump between related documents, and open the canonical source in GitHub when you need the raw markdown.

Policy 4 of 12
Browse every core legal document.
5 sections
In-page anchors for longer documents.
Synced from GitHub
Raw markdown stays one click away.
This document is rendered from the markdown source used in Bento's public legal repository.

Bento provides email, messaging, automation, and related tools that depend on shared infrastructure, sending reputation, legal compliance, and trust. This Acceptable Use Policy explains the conduct, content, and use cases we do not allow on or through Bento.

This Acceptable Use Policy (this Policy) applies to any website, product, service, API, integration, or feature provided by Bento (collectively, the Services), whether provided directly by us or through a partner. By accessing or using the Services, you agree to comply with this Policy.

If you use Bento for SMS, MMS, or similar mobile messaging, you must also comply with our SMS Messaging Compliance Policy.

The examples below are not exhaustive. Capitalized terms not defined here have the meanings given in our Terms.

Prohibited conduct

You may not use the Services, or allow any other person to use the Services through your account, to:

  • promote, condone, encourage, or facilitate hate, violence, or discrimination based on race, ethnicity, color, national origin, religion, age, sex, gender, gender identity, sexual orientation, disability, medical condition, veteran status, or any similar protected characteristic;
  • engage in, promote, facilitate, or assist unlawful activity, or violate any applicable law, regulation, code, or industry rule, including privacy, spam, consumer protection, export control, and telecommunications laws;
  • offer, market, promote, or operate high-risk or prohibited businesses or campaigns, including escort or adult dating services, multi-level marketing, list brokers, list rental services, credit repair or debt relief schemes, gambling, unlicensed pharmaceutical sales, social media engagement manipulation, make-money-online schemes, lead generation schemes based on purchased or scraped data, or any substantially similar business model we determine creates legal, abuse, reputational, or deliverability risk;
  • violate the rights of others, including privacy rights, publicity rights, intellectual property rights, and anti-spam rights;
  • remove, obscure, or alter copyright, trademark, or other proprietary notices contained in the Services;
  • impersonate any person or entity, misrepresent your affiliation, spoof headers or identities, phish, or access or use another person's account without permission;
  • send to purchased, rented, borrowed, scraped, appended, enriched, third-party, or otherwise non-permission-based lists;
  • harvest, collect, enrich, append, or otherwise obtain information about people without a lawful basis or required consent;
  • engage in snowshoeing, traffic spreading, domain rotation, sender identity rotation, or similar practices intended to evade spam filters, carrier controls, provider policies, enforcement, or reputation systems;
  • use Bento to clean, validate, warm, score, enrich, bridge, or waterfall traffic to another provider where the primary purpose is to bypass another platform's rules, sending restrictions, or deliverability controls;
  • harm minors, interact with minors in an unlawful or inappropriate way, or target children in violation of law;
  • disable, avoid, circumvent, probe, damage, or otherwise interfere with security, authentication, access controls, or technical restrictions of the Services;
  • overload, disrupt, or attempt to overwhelm the Services or related infrastructure, including through excessive automated requests, abusive API usage, denial-of-service activity, or usage materially beyond documented or permitted limits;
  • use Bento's name, marks, or metadata in a misleading way, including in hidden text, meta tags, or other deceptive contexts;
  • promote or facilitate speculative or high-risk financial activity that we determine creates elevated legal, abuse, fraud, chargeback, or reputational risk, including deceptive token, cryptocurrency, or digital asset schemes;
  • use the Services in violation of applicable messaging or communications industry standards, including carrier, platform, CTIA, and similar rules where applicable; or
  • authorize, permit, enable, induce, or encourage any third party to do any of the above.

Prohibited content and data

You may not use the Services to store, process, display, send, transmit, or solicit:

  • content that promotes, condones, encourages, or facilitates hate, violence, or discrimination as described above;
  • content that is unlawful, deceptive, fraudulent, defamatory, libelous, threatening, harassing, obscene, pornographic, harmful to minors, or materially misleading;
  • content that infringes, misappropriates, or otherwise violates the rights of any third party;
  • malware, viruses, Trojan horses, spyware, worms, malicious code, or other harmful software or payloads;
  • spam or commercial electronic messages sent in violation of the Spam Act 2003 (Cth), CAN-SPAM, GDPR, TCPA, or any similar law applicable to you, your recipients, or your use of the Services;
  • SMS, MMS, push, or other messaging traffic that violates carrier rules, platform rules, or telemarketing and consumer protection laws;
  • SMS, MMS, email, or other campaigns designed primarily for affiliate arbitrage, lead brokering, list reselling, traffic arbitrage, or similar intermediary marketing models that we determine create elevated abuse, consent, or reputational risk;
  • special category or sensitive data, medical records, protected health information, non-public government identifiers, financial account information, payment card information, or children's data, unless we expressly agree otherwise in writing; or
  • any data or content that we determine, in our sole discretion, creates legal, regulatory, reputational, abuse, fraud, security, or deliverability risk for Bento, our suppliers, or our customers.

Enforcement

We may, but are not required to, monitor or investigate use of the Services for compliance with this Policy, our Terms, and any other agreement between you and us.

We may suspend or terminate access to the Services, remove content, delay, reject, block, or throttle traffic, require remediation, or take any other action we consider appropriate, with or without prior notice as permitted by the Terms and applicable law, and without liability to the extent permitted by law, if we determine in our sole discretion that:

  • you or your end users have violated this Policy or helped others do so;
  • your use of the Services poses or could pose spam, abuse, fraud, security, deliverability, legal, regulatory, or reputational risk to Bento, the Services, our suppliers, or other customers; or
  • conduct related to your account, onboarding, data sources, sending practices, message content, integrations, or business model conflicts with this Policy, our Terms, or our risk standards.

We may rely on any information reasonably available to us, including complaints, bounce data, spam complaints, carrier or platform feedback, third-party reports, and technical signals.

Nothing in this Policy limits any other right or remedy available to us under contract, at law, or in equity.

Changes to this policy

We may update this Policy from time to time by posting an updated version on our website or through the Services, or by otherwise providing notice to you. Unless we state a different effective date, the updated version becomes effective when posted or when notice is given, except to the extent a longer notice period is required by the Terms, another agreement with you, or applicable law. Your continued use of the Services after the updated version becomes effective constitutes acceptance of the revised Policy.

Reporting violations

If you become aware of a violation of this Policy, please contact report@bentonow.com and include as much detail as you can about the relevant account, domain, sender identity, campaign, URL, or message. Additional reporting guidance is available on our Abuse Reporting page.