1. Definitions & Scope
This Master Service Agreement ("Agreement") is a binding legal contract between Xeron Infrastructure Solutions Ltd. ("Provider") and the entity identified in the workspace authorization ("Client").
"Service" refers to the Xeron Studio Core dispatching engine, API endpoints, and associated burst traffic relays.
2. Permitted Nature of Emails (Strictly Transactional)
2.1 Authorized Traffic Types
The Service is engineered exclusively for System Alerts and Transactional Notifications. Clients are authorized to send only the following categories of email:
- Rendering Completions: Notifications regarding the status of digital asset processing.
- Security Alerts: 2FA codes, password resets, unusual login activity warnings.
- Infrastructure Updates: Server downtime alerts, API key rotation notices.
- Billing & Legal: Invoices, receipts, and policy updates.
Marketing Prohibition: The use of Xeron Infrastructure for promotional campaigns, newsletters, sales outreach, or any form of "cold emailing" is strictly prohibited and will result in immediate API key revocation.
3. Zero Tolerance Spam Policy
We maintain a zero-tolerance stance towards unsolicited commercial email (UCE). By using our infrastructure, you acknowledge that:
Prohibited Content
We do not process traffic related to:
- - Affiliate Marketing
- - Cryptocurrency / Forex Trading
- - Adult Content / Gambling
- - Lead Generation Services
Enforcement Mechanism
Our AI-driven heuristic engines monitor all outbound bursts. Any traffic pattern resembling bulk marketing triggers an automatic hard-stop on the workspace.
4. List Management & Consent Protocols
To ensure high deliverability and compliance with GDPR and CAN-SPAM regulations, Xeron Infrastructure mandates strict list hygiene.
4.1 Prohibition of Purchased Lists
The use of purchased, rented, or scraped email lists is forbidden. Client warrants that all recipients have a direct, pre-existing relationship with the Client.
4.2 Double Opt-In Requirement
We strongly recommend, and for certain high-volume tiers require, a Double Opt-In (DOI) process. You must be able to provide proof of consent (timestamp and IP address) for every recipient upon request by our Compliance Team within 24 hours.
5. Data Retention & Security (SOC2)
All transactional data passing through Xeron Infrastructure is encrypted at rest and in transit using TLS 1.3. Logs are retained for 30 days for debugging purposes and then permanently expunged, in accordance with our SOC2 Type II controls.
6. Termination of Service
Xeron Infrastructure Solutions Ltd. reserves the right to terminate any workspace immediately, without refund, if a violation of this AUP is detected. High bounce rates (>5%) or spam complaint rates (>0.1%) constitute a material breach of this Agreement.
For compliance inquiries or to report abuse, please contact:
legal-compliance@xeronstudio.com (Priority Handle)