Acceptable Use Policy

Guidelines for acceptable use of Key Man Out services

Acceptable Use Policy

Effective date: January 2025

This Acceptable Use Policy ("AUP") describes the permitted and prohibited uses of Key Man Out (the "Service"). This AUP is incorporated into and forms part of our Terms of Service. By using the Service, you agree to comply with this policy.

Capitalized terms not defined in this AUP have the meanings given to them in our Terms of Service.

Overview

Key Man Out is a Business Continuity Vault designed to help organizations and individuals securely store sensitive credentials and documents with controlled access for designated successors. We are committed to ensuring the Service is used responsibly and legally.

Permitted Uses

The Service is intended for legitimate business continuity, estate planning, and secure credential management purposes, including but not limited to:

Business Continuity Planning

  • Storing business credentials with controlled team access
  • Managing IT infrastructure access keys and secrets
  • Ensuring continuity of operations if key personnel become unavailable
  • Maintaining disaster recovery access to critical systems

Estate and Personal Planning

  • Personal emergency preparedness and estate planning
  • Family credential sharing with controlled access
  • Ensuring trusted individuals can access important accounts if needed
  • Digital asset inheritance planning

Professional Services

  • Client credential management for agencies and service providers (with client consent)
  • IT managed services credential storage
  • Legal and financial services document management

Team Collaboration

  • Shared team credential vaults with appropriate access controls
  • Secure onboarding and offboarding of team members
  • Role-based access to sensitive information

Prohibited Uses

You may not use the Service for any purpose that is illegal, harmful, or violates the rights of others. The following activities are strictly prohibited:

Illegal Activities

You may not use the Service:

  • To store, distribute, or facilitate access to any illegal content or materials
  • For money laundering, terrorist financing, or other financial crimes
  • To violate any applicable local, state, national, or international laws or regulations
  • To infringe upon the intellectual property rights of others, including copyrights, trademarks, patents, or trade secrets
  • To store evidence of illegal activity or proceeds of crime
  • In connection with any illegal gambling or gaming activities

Harmful and Malicious Activities

You may not use the Service:

  • To store malware, viruses, ransomware, or other harmful code
  • To conduct, plan, or facilitate cyberattacks or unauthorized intrusions
  • To store stolen credentials, data, or information obtained through unauthorized access
  • To facilitate unauthorized access to computer systems, networks, or accounts
  • To store tools or resources intended primarily for hacking or unauthorized access
  • To engage in or facilitate phishing, social engineering, or fraud

Abuse of the Service

You may not:

  • Attempt to bypass, disable, or circumvent any security controls or access restrictions
  • Reverse engineer, decompile, disassemble, or attempt to derive the source code of the Service
  • Create multiple accounts to circumvent usage limits or evade enforcement actions
  • Share your account credentials or allow unauthorized access to your account
  • Use automated tools, bots, or scripts to access the Service without our express permission
  • Interfere with or disrupt the Service, servers, or networks connected to the Service
  • Attempt to probe, scan, or test the vulnerability of our systems without authorization
  • Overwhelm or attempt to overwhelm our infrastructure (e.g., denial of service attacks)

Content Restrictions

You may not store, transmit, or otherwise make available:

  • Child Sexual Abuse Material (CSAM): Any content depicting the sexual exploitation or abuse of minors. We have a zero-tolerance policy and will report any suspected CSAM to the National Center for Missing & Exploited Children (NCMEC) and relevant law enforcement agencies.
  • Terrorist Content: Content that promotes, supports, or is created by terrorist organizations
  • Violent Content: Content that promotes violence, incites harm, or threatens specific individuals or groups
  • Hate Speech: Content that attacks, demeans, or incites violence against individuals or groups based on protected characteristics such as race, ethnicity, religion, gender, sexual orientation, disability, or national origin
  • Stolen Personal Data: Personal information obtained through unauthorized access, data breaches, or other illegal means
  • Non-Consensual Intimate Images: Intimate images of individuals shared without their consent
  • Defamatory Content: Content that contains false statements of fact that damage the reputation of individuals or organizations

Commercial Misuse

You may not:

  • Resell, sublicense, or commercially redistribute access to the Service
  • Use the Service to build a competing product or service
  • Use the Service to gather competitive intelligence about Key Man Out
  • Use the Service as a general-purpose file storage or backup service beyond its intended purpose
  • Use the Service to store content for public distribution or sharing

Fraudulent and Deceptive Activities

You may not:

  • Misrepresent your identity or affiliation with any person or organization
  • Create accounts using false or misleading information
  • Use the Service to conduct or facilitate any fraudulent schemes
  • Impersonate Key Man Out, our employees, or other users

Enforcement

Reporting Violations

If you become aware of any violation of this AUP, please report it to: legal@keymanout.app

When reporting, please provide:

  • A description of the violation
  • Any relevant evidence or information
  • Your contact information (optional, but helpful for follow-up)

We take all reports seriously and will investigate appropriately.

Investigation Process

When we receive a report or otherwise become aware of a potential violation:

  1. We will review the available information
  2. We may contact you for additional information or clarification
  3. We will make a determination based on the facts available

Important Note on Zero-Knowledge Architecture: Due to our zero-knowledge encryption, we cannot access or inspect the content of your encrypted secrets and file attachments. We can access asset metadata (titles, instructions, website URLs). Our ability to investigate is limited to:

  • Observable account behavior and activity patterns
  • Reports from users or third parties
  • Information you provide to us
  • Legal requests with appropriate legal process
  • Publicly available information

Enforcement Actions

If we determine that a violation has occurred, we may take one or more of the following actions, depending on the severity and nature of the violation:

  • Warning: We may issue a warning and request that you cease the violating activity
  • Content Removal: If possible and appropriate, we may remove specific content (though we cannot access encrypted secrets)
  • Account Suspension: We may temporarily suspend your access to the Service pending further investigation or remediation
  • Account Termination: We may permanently terminate your account and access to the Service
  • Legal Action: We may pursue legal remedies, including seeking damages or injunctive relief
  • Law Enforcement Referral: We may report violations to appropriate law enforcement agencies, particularly for serious offenses such as CSAM, terrorism, or threats of violence

We reserve the right to take any action we deem appropriate to protect the Service, our users, and third parties.

Appeal Process

If your account has been suspended or terminated, you may appeal the decision by contacting: legal@keymanout.app

Your appeal should include:

  • Your account information
  • An explanation of why you believe the decision was incorrect
  • Any relevant evidence or information

We will review appeals in good faith and respond within a reasonable timeframe. However, our decision on appeals is final.

Cooperation with Law Enforcement

We comply with valid legal process, including subpoenas, court orders, and warrants. We may disclose account information and other data as required by law.

Limitations Due to Zero-Knowledge Architecture

Due to our zero-knowledge encryption architecture:

  • We cannot provide access to the content of your encrypted secrets, even if legally compelled
  • We can provide asset metadata (titles, instructions, website URLs, guardian assignments) and account information
  • Law enforcement requests for encrypted secrets will be responded to with an explanation of our technical limitations

Voluntary Disclosure

We may voluntarily disclose information to law enforcement or other third parties in emergency circumstances involving imminent threat of death or serious physical injury.

No Monitoring

Due to our zero-knowledge architecture, we do not and cannot proactively monitor the content of your encrypted secrets. Asset metadata (titles, instructions) is accessible to us but is not routinely monitored. This AUP is enforced based on:

  • Observable account behavior and activity patterns
  • Reports from users or third parties
  • Legal requests with appropriate legal process
  • Public information
  • Information you voluntarily provide

We respect your privacy and cannot access your encrypted secrets. However, this does not mean we condone or will ignore violations of this AUP. We will take appropriate action based on the information available to us, including asset metadata and account activity.

Your Responsibilities

You are responsible for:

  • Ensuring your use of the Service complies with this AUP
  • Ensuring that all team members and users you invite comply with this AUP
  • Promptly reporting any violations you become aware of
  • Maintaining appropriate security controls for your account

If you are using the Service on behalf of an organization, you are responsible for ensuring that all users within your organization comply with this AUP.

Changes to This Policy

We may update this AUP from time to time to address new issues, reflect changes in the Service, or respond to legal or regulatory developments.

If we make material changes, we will notify you by:

  • Posting the updated AUP on our website with a new effective date
  • Sending you an email notification (if we have your email address)
  • Displaying a prominent notice within the Service

Your continued use of the Service after any changes constitutes your acceptance of the updated AUP.

Relationship to Terms of Service

This AUP is part of and incorporated into our Terms of Service. In the event of any conflict between this AUP and the Terms of Service, the Terms of Service will govern.

Violations of this AUP may result in termination of your account and access to the Service, as described in our Terms of Service.

Contact Us

If you have questions about this AUP or need to report a violation, please contact us at:

Email: legal@keymanout.app

Mailing Address: KeyManOut LLC Tennessee, USA


This Acceptable Use Policy was last updated in January 2025.