ACCEPTABLE USE POLICY (AUP)
Last Updated: June 23, 2025
Effective Date: June 23, 2025
1. INTRODUCTION AND SCOPE
This Acceptable Use Policy (“AUP”) governs the use of the VENDOR website (https://vendor.energy) and related services provided by MICRO DIGITAL ELECTRONICS CORP S.R.L. (“Company,” “we,” “us,” or “our”). This AUP forms an integral part of our Terms of Service and applies to all users, visitors, and participants accessing our platform.
By accessing or using our website and services, you agree to comply with this AUP and acknowledge that violations may result in immediate termination of access without notice.
2. COMPANY INFORMATION
Legal Entity:
MICRO DIGITAL ELECTRONICS CORP S.R.L.
Registration Number: 50047468
Address: Splaiul Unirii nr. 16, office 705, Bucharest, Sector 4, Romania
Contact Information:
General Inquiries: info@vendor.energy
Policy Violations: vp@vendor.energy
3. POLICY OBJECTIVES
3.1 Primary Objectives
This AUP is designed to:
- Protect the security and integrity of our systems and data
- Ensure compliance with applicable laws and regulations
- Maintain a professional environment for business communications
- Protect the rights and privacy of all users and third parties
- Preserve the reputation and business interests of the Company
- Prevent misuse of energy-related information and investment data
3.2 Scope of Application
This AUP applies to:
- All website visitors and registered users
- Business partners and potential investors
- Newsletter subscribers and communication recipients
- Third parties accessing our content through authorized channels
- Any use of our intellectual property or branded materials
4. PERMITTED USES
4.1 Authorized Activities
You are permitted to use our website and services for:
Information Access:
- Reading project information and updates about VENDOR energy initiatives
- Researching investment opportunities and technical documentation
- Accessing publicly available reports, whitepapers, and presentations
- Viewing company news, press releases, and announcements
Business Communications:
- Submitting legitimate business inquiries through contact forms
- Requesting meetings or consultations for investment purposes
- Subscribing to newsletters and project updates
- Engaging in authorized business correspondence
Educational and Research Purposes:
- Academic research on energy technologies and market trends
- Industry analysis and competitive intelligence gathering
- Educational use for training and professional development
- Reference purposes for business planning and strategy
Sharing and Attribution:
- Sharing content with proper attribution to VENDOR and the Company
- Referencing our information in presentations with appropriate credits
- Linking to our website from legitimate business or educational contexts
- Quoting limited portions of content with proper citation
5. PROHIBITED USES
5.1 Illegal and Harmful Activities
Absolutely Prohibited:
- Any illegal activities or violations of applicable laws and regulations
- Fraud, misrepresentation, or deceptive practices
- Money laundering or financing of illegal activities
- Violations of export control laws or sanctions
- Insider trading or securities law violations
- Bribery, corruption, or unethical business practices
Security Violations:
- Unauthorized access attempts to our systems or data
- Hacking, cracking, or penetration testing without permission
- Distributing malware, viruses, or other malicious code
- Attempting to bypass security measures or access controls
- Denial of service attacks or system overloading
- Social engineering attempts against our staff or users
5.2 Intellectual Property Violations
Copyright Infringement:
- Unauthorized reproduction of copyrighted materials
- Distribution of proprietary content without permission
- Creating derivative works from our protected content
- Removing or altering copyright notices and attributions
- Mass downloading or systematic content extraction
Trademark Misuse:
- Unauthorized use of VENDOR trademarks or logos
- Creating confusion about brand affiliation or endorsement
- Using our trademarks in domain names or business names
- Dilution or tarnishment of our brand reputation
Trade Secret Violation:
- Unauthorized disclosure of confidential business information
- Reverse engineering of proprietary technologies
- Misappropriation of business strategies or plans
- Sharing of non-public financial or operational data
5.3 Investment and Financial Misconduct
Securities Violations:
- Providing unauthorized investment advice or recommendations
- Creating or distributing misleading investment materials
- Insider trading based on non-public information
- Market manipulation or fraudulent investment schemes
- Offering unregistered securities or investment products
Financial Fraud:
- Misrepresenting financial capacity or investment credentials
- Creating false identities for investment purposes
- Laundering money through investment activities
- Tax evasion or avoidance schemes
- Ponzi schemes or pyramid marketing structures
5.4 Energy Sector Specific Violations
Regulatory Compliance:
- Violations of energy market regulations
- Unauthorized energy trading activities
- Non-compliance with environmental protection laws
- Breach of safety regulations in energy operations
- Violations of renewable energy certification requirements
Technical Misuse:
- Misrepresenting technical capabilities or specifications
- Providing false environmental impact assessments
- Distributing inaccurate energy production data
- Manipulating energy efficiency calculations
- Falsifying sustainability credentials or certifications
Market Manipulation:
- Spreading false information about energy markets
- Manipulating energy commodity prices
- Creating artificial scarcity or demand
- Engaging in anti-competitive practices
- Cartels or price-fixing agreements
6. COMMUNICATION STANDARDS
6.1 Professional Communication Requirements
Business Correspondence:
- Maintain professional tone and language in all communications
- Provide accurate and truthful information in inquiries and responses
- Respect confidentiality agreements and non-disclosure obligations
- Use appropriate business etiquette and cultural sensitivity
- Respond promptly to legitimate business communications
Investment Communications:
- Disclose all material conflicts of interest
- Provide accurate financial and investment information
- Comply with securities disclosure requirements
- Maintain confidentiality of sensitive investment discussions
- Follow insider trading prevention procedures
6.2 Prohibited Communication Practices
Harassment and Abuse:
- Threatening, intimidating, or harassing behavior
- Discriminatory language or hate speech
- Personal attacks or defamatory statements
- Sexual harassment or inappropriate advances
- Cyberbullying or persistent unwanted contact
Spam and Unsolicited Communications:
- Mass unsolicited email distribution (spam)
- Automated messaging or bot communications
- Chain letters or pyramid communication schemes
- Excessive or repetitive contact attempts
- Unauthorized marketing or promotional messages
Misleading Communications:
- False or misleading statements about investments
- Impersonation of Company representatives or third parties
- Misrepresentation of credentials or qualifications
- Spreading false rumors or unverified information
- Creating fake testimonials or endorsements
7. DATA PROTECTION AND PRIVACY
7.1 Personal Data Handling
Data Collection Compliance:
- Only collect personal data for legitimate business purposes
- Obtain proper consent for data processing activities
- Respect data minimization principles
- Implement appropriate security measures for data protection
- Comply with data retention and deletion requirements
Privacy Obligations:
- Respect privacy rights of all individuals
- Comply with GDPR and applicable privacy laws
- Maintain confidentiality of personal information
- Report data breaches promptly and appropriately
- Honor data subject rights requests
7.2 Prohibited Data Practices
Data Misuse:
- Unauthorized collection of personal data
- Sharing personal data without proper consent
- Using personal data for unauthorized purposes
- Combining datasets without proper legal basis
- Selling or monetizing personal data inappropriately
Privacy Violations:
- Surveillance or monitoring without consent
- Identity theft or impersonation
- Unauthorized access to private information
- Doxxing or public disclosure of private data
- Stalking or harassment using personal information
8. TECHNICAL USE STANDARDS
8.1 Authorized Technical Activities
Permitted Technical Use:
- Normal web browsing and content access
- Legitimate automated tools for content monitoring (with rate limiting)
- Authorized API usage within documented limits
- Accessibility tools and assistive technologies
- Standard web analytics and measurement tools
8.2 Prohibited Technical Activities
System Abuse:
- Excessive bandwidth consumption or resource usage
- Automated content scraping without permission
- Circumvention of rate limiting or access controls
- Unauthorized system monitoring or reconnaissance
- Load testing or stress testing without authorization
Infrastructure Attacks:
- Distributed denial of service (DDoS) attacks
- Attempts to crash or overwhelm our systems
- Network scanning or vulnerability assessment
- Exploitation of system vulnerabilities
- Unauthorized access to restricted areas
9. CONTENT STANDARDS
9.1 Acceptable Content Guidelines
Quality Standards:
- Accurate and factual information sharing
- Professional and business-appropriate content
- Respectful and constructive commentary
- Properly sourced and attributed materials
- Relevant and on-topic discussions
9.2 Prohibited Content
Harmful Content:
- Violent, threatening, or intimidating content
- Discriminatory or hateful content based on protected characteristics
- Sexually explicit or inappropriate content
- Content promoting illegal drugs or controlled substances
- Content glorifying or promoting violence or terrorism
Misleading Content:
- False or misleading investment information
- Fake news or disinformation about energy markets
- Manipulated images or deepfakes
- Misleading technical specifications or performance data
- False endorsements or testimonials
Commercial Violations:
- Unauthorized advertising or promotional content
- Competing business solicitations
- Multi-level marketing or pyramid schemes
- Unauthorized affiliate marketing links
- Trademark or copyright infringing content
10. ENFORCEMENT PROCEDURES
10.1 Violation Detection
Monitoring Systems:
- Automated content filtering and detection systems
- User reporting mechanisms for policy violations
- Regular security monitoring and threat detection
- Compliance auditing and review processes
- Third-party security and content monitoring services
Investigation Process:
- Prompt investigation of reported violations
- Preservation of evidence for potential legal proceedings
- Coordination with law enforcement when appropriate
- Documentation of violation patterns and repeat offenses
- Fair and impartial review of alleged violations
10.2 Escalation Procedures
Warning System:
- First Violation: Written warning with policy clarification
- Second Violation: Temporary access restriction (7-30 days)
- Third Violation: Extended suspension and review
- Serious Violations: Immediate termination and potential legal action
Immediate Termination Offenses:
- Illegal activities or criminal behavior
- Security breaches or hacking attempts
- Severe harassment or threatening behavior
- Major intellectual property violations
- Financial fraud or investment scams
11. SANCTIONS AND REMEDIES
11.1 Available Sanctions
Access Restrictions:
- Temporary suspension of website access
- Permanent termination of user accounts
- Blocking of IP addresses or domains
- Restriction of specific features or services
- Removal from mailing lists and communications
Content Actions:
- Removal of violating content or communications
- Suspension of posting or communication privileges
- Moderation of future content submissions
- Requirement for pre-approval of content
- Labeling of content with warnings or disclaimers
11.2 Legal Remedies
Civil Remedies:
- Cease and desist orders
- Injunctive relief to prevent ongoing violations
- Monetary damages for losses caused by violations
- Recovery of legal fees and enforcement costs
- Restitution for misappropriated intellectual property
Criminal Referrals:
- Reporting to law enforcement for criminal activities
- Cooperation with regulatory investigations
- Coordination with international law enforcement
- Preservation of evidence for criminal proceedings
- Testimony and expert witness services
12. REPORTING VIOLATIONS
12.1 Reporting Procedures
How to Report:
- Email: vp@vendor.energy for policy violations
- Subject Line: “AUP Violation Report – [Brief Description]”
- Required Information:
- Detailed description of the violation
- Evidence or documentation of the violation
- Contact information for follow-up
- Date, time, and circumstances of the violation
Response Timeline:
- Acknowledgment: Within 24 hours of receipt
- Initial Review: Within 3 business days
- Investigation: Within 10 business days
- Resolution: Within 30 days for complex cases
12.2 Whistleblower Protection
Protection Measures:
- Confidentiality of reporter identity where legally permitted
- Non-retaliation policies for good faith reporting
- Anonymous reporting options where available
- Legal protection under applicable whistleblower laws
- Support for reporters facing retaliation
13. APPEALS AND DISPUTE RESOLUTION
13.1 Appeals Process
Right to Appeal: Users may appeal enforcement actions by:
- Submitting written appeal to vp@vendor.energy
- Providing detailed justification for appeal
- Including any additional evidence or context
- Requesting specific relief or reinstatement
Appeals Review:
- Independent review by senior management
- Consideration of all evidence and circumstances
- Response within 15 business days
- Final decision communicated in writing
- Option for further escalation to external mediation
13.2 Alternative Dispute Resolution
Mediation Options:
- Professional mediation services for complex disputes
- Industry-specific arbitration where appropriate
- Regulatory complaint procedures
- Consumer protection agency involvement
- International dispute resolution for cross-border issues
14. UPDATES AND MODIFICATIONS
14.1 Policy Updates
Amendment Process:
- Regular review and update of policy provisions
- Notification of material changes to users
- Opportunity for comment on significant changes
- Implementation with appropriate notice periods
- Grandfathering of existing compliant activities
14.2 Notification Procedures
Change Notifications:
- Email notification to registered users
- Prominent website notice for 30 days
- Updated effective date clearly displayed
- Summary of material changes provided
- Contact information for questions about changes
15. INTERNATIONAL COMPLIANCE
15.1 Multi-Jurisdictional Requirements
Applicable Laws:
- Romanian law as primary jurisdiction
- European Union regulations and directives
- International treaties and agreements
- Local laws in user jurisdictions
- Sector-specific regulations (energy, finance, technology)
15.2 Conflict Resolution
Legal Conflicts:
- Compliance with most restrictive applicable law
- Consultation with legal experts in relevant jurisdictions
- Coordination with regulatory authorities
- Modification of services to ensure compliance
- Restriction of access where compliance is not possible
16. CONTACT INFORMATION
For AUP-related matters:
Policy Violations and Enforcement:
Vitaly Peretyachenko
Email: vp@vendor.energy
General Inquiries:
Email: info@vendor.energy
Postal Address:
MICRO DIGITAL ELECTRONICS CORP S.R.L.
Splaiul Unirii nr. 16, office 705
Bucharest, Sector 4, Romania
Emergency Contacts:
For urgent security matters: Mark emails as “URGENT SECURITY”
For legal emergencies: Mark emails as “LEGAL URGENT”
This Acceptable Use Policy is effective as of the date first set forth above and applies to all use of our website and services.
Violations of this AUP may result in immediate termination of access and potential legal action.
© 2025 MICRO DIGITAL ELECTRONICS CORP S.R.L. All rights reserved.