Acceptable Use Policy
This policy explains what is allowed and not allowed when using StayKnown. It is written for a global safety product and focuses on preventing stalking, harassment, scams, and misuse that can put people at risk.
1) Purpose
StayKnown exists to help people stay safe during travel, meetups, late-night movement, and other real-life situations. The product is built around consent and transparency: you start sessions, you choose contacts, and you can stop sharing.
- Sharing your route with a trusted family member while traveling at night.
- Starting a Visit session to reduce fear and uncertainty during a first meeting.
- Using SOS to notify trusted contacts when you feel unsafe (where available).
2) Core rules (plain language)
- Use StayKnown only for lawful, safety-focused purposes.
- Only add contacts you have permission to notify.
- Do not create false emergencies or fake SOS alerts.
- Do not attempt to bypass plan limits or manipulate the product.
- Respect requests to stop—remove contacts if asked.
3) Anti-stalking & harassment
You may not use StayKnown to stalk, harass, intimidate, threaten, or monitor someone without permission. This includes repeated unwanted notifications, tracking behavior, coercion, and using location signals to control or frighten someone.
- No covert surveillance: do not use StayKnown to secretly track people.
- No intimidation: do not use alerts to scare or pressure someone.
- No control: do not use safety tools to control where someone goes or who they meet.
- No violations of protective orders: do not use StayKnown to violate restraining/protective orders.
- Adding your ex-partner’s email to repeatedly send unwanted session alerts.
- Using location sharing to follow someone after they told you to stop.
- Starting sessions to ‘prove’ someone’s location or to threaten them.
4) Fraud, scams, and kidnapping-related misuse
Safety tools can be abused by criminals (for example: scams, extortion, kidnapping coordination, or creating fake emergencies). StayKnown strictly prohibits using the Service to lure, trap, extort, or mislead anyone.
- No false emergencies: do not use SOS to create panic or mislead contacts.
- No luring: do not use StayKnown to convince someone to go somewhere unsafe.
- No extortion: do not use safety logs or contact alerts to threaten or pressure someone.
5) Violence, harm, and exploitation
- No violence facilitation: do not use StayKnown to coordinate harm.
- No trafficking exploitation: do not use StayKnown to target or move victims.
- No targeting vulnerable people: do not use the Service to identify or exploit others.
6) Spam & contact abuse
Contact delivery is a safety channel—not a marketing channel. You may not spam people, bulk-message strangers, or repeatedly trigger alerts to cause distress.
- Do not add contacts without permission.
- Do not repeatedly trigger alerts to annoy or threaten someone.
- Do not use StayKnown as a broadcast or promotional system.
7) Security, interference, and bypass attempts
- Do not attempt to reverse engineer, disrupt, or interfere with the Service.
- Do not attempt to access accounts, sessions, or data that are not yours.
- Do not bypass device integrity checks, rate limits, or anti-abuse protections.
8) Reporting & enforcement
Violations may lead to warnings, restrictions, suspension, or permanent ban. Where required by law or necessary to prevent harm, we may preserve logs and cooperate with lawful requests.
To report misuse: support@stay-known.com (include what happened, dates, and any screenshots you can safely share).
Appendix A — In-app text this policy expands
This page expands the short “Prohibited Uses / Fraud / Platform Integrity / Duties” content shown inside the app.
- You may not use StayKnown to:
- • Stalk, harass, intimidate, or threaten anyone.
- • Track people without consent or knowledge (covert surveillance).
- • Facilitate physical harm, kidnapping, extortion, trafficking, or violence.
- • Collect location data to target or exploit a person.
- • Abuse email delivery (spamming contacts or third parties).
- • Attempt to access accounts, sessions, or data that are not yours.
- • Reverse engineer, interfere with, or disrupt the service.
- • Use the service to violate restraining orders, protective orders, or similar legal restrictions.