websights

FREE EBOOK: Mastering A2P 10DLC Registration

Learn more

Acceptable Use Policy

This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“Customer”) using the Application-to-Person (A2P) type messaging platform (“Telgorithm Platform”) provided by Telgorithm Inc. (“Telgorithm”) and any user of any software application or service made available by Customer that interfaces with the Telgorithm Platform (“End User”). The examples described in this AUP are not exhaustive. Customer is responsible for its End Users’ compliance with this AUP. 

Inappropriate Content or Users. Do not use the Telgorithm Platform to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, objectionable, confirmed to be criminal misinformation, or otherwise poses a threat to the public. This prohibition includes use of the Telgorithm Platform by a hate group or content or communications that originate from a hate group or are exploitive, abusive, or hate speech.

Prohibited Activities. Do not use the Telgorithm Platform to engage in or encourage any activity that is illegal, deceptive, harmful, violating others’ rights, or harmful to Telgorithm’s business operations or reputation, including:

  • Violations of Laws. Violating any applicable laws, regulations, or industry standards or guidance (collectively, “Applicable Laws”). This includes violating Applicable Laws requiring (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications.
  • Interference with the Telgorithm Platform. Interfering with or otherwise negatively impacting any aspect of the Telgorithm Platform or any third-party networks that are linked to the Telgorithm Platform.
  • Reverse Engineering. Reverse engineering, copying, disassembling, or decompiling any component of the Telgorithm Platform.
  • Falsification of Identity or Origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.

Service Integrity Violations. Do not violate the integrity of the Telgorithm Platform, including:

  • Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Telgorithm Platform.
  • Security Vulnerabilities. Finding security vulnerabilities to exploit the Telgorithm Platform or attempting to bypass any security mechanism or filtering capabilities.
  • Disabling the Telgorithm Platform. Any denial of service (DoS) attack on the Telgorithm Platform or any other conduct that attempts to disrupt, disable, or overload the Telgorithm Platform.
  • Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Telgorithm Platform.
  • Unauthorized Access. Attempting to gain unauthorized access to the Telgorithm Platform.

Data Safeguards. Customer is responsible for determining whether the Telgorithm Platform offers appropriate safeguards for Customer’s use of the Telgorithm Platform, including, but not limited to, any safeguards required by Applicable Laws, prior to transmitting or processing, or prior to permitting End Users to transmit or process, any data or communications via the Telgorithm Platform.

The Campaign Registry Guidelines. Customer must adhere to and stay in compliance with all registration guidelines set forth by The Campaign Registry as provided by Telgorithm.

Telgorithm’s Messaging Policy

This Messaging Policy is part of this AUP and applies to SMS and MMS messaging channels. To ensure all messages are received, unhindered by filtering or other similar blockers, Telgorithm strives to work with Customers so that messages are sent with the consent of the message recipient, and that those messages comply with all applicable laws and communications industry guidelines or standards.

Messaging. Telgorithm treats all messaging transmitted via Telgorithm Platform, regardless of use case or phone number type (e.g., long code or toll-free), as A2P messaging. All A2P messages originating from Telgorithm are subject to this Messaging Policy, which covers rules and /or prohibitions regarding:

  • Consent (“opt-in”);
  • Revocation of Consent (“opt-out”);
  • Sender Identification;
  • Messaging Usage; and
  • Enforcement.

If Customer provides its own End Users with the ability to send messages through Telgorithm Platform, for example as an independent software vendor, Customer is responsible for the messaging activity of its End Users. Customer must ensure that any messaging activity generated by its End Users is in compliance with Telgorithm’s policies.

Consent/Opt-in. Consent cannot be bought, sold, or exchanged. For example, Customer cannot obtain the consent of message recipients by purchasing a phone list from another party. Aside from Alternative Consent Requirements noted below, Customer must meet each of the consent requirements listed below. If Customer is a software or platform provider using Telgorithm Platform for messaging within its application or service, Customer must require its End Users to adhere to these same requirements.

Consent Requirements

  • Prior to sending the first message, Customer must obtain agreement from the message recipient to communicate with them – this is referred to as “consent”. Customer must make clear to the individual they are agreeing to receive messages of the type that is being sent. Customer needs to keep a record of the consent, such as a copy of the document or form that the message recipient signed or a timestamp of completion of a sign-up flow.
  • If Customer does not send an initial message to that individual within a reasonable period after receiving consent (or as set forth by local regulations or best practices), then Customer must reconfirm consent in the first message sent to that recipient.
  • The consent applies only to the specific use or campaign that the recipient has consented to. Customer cannot treat such consent as blanket consent for messages from other brands or companies Customer may have, or additional messages about other uses or campaigns.
  • Proof of opt-in consent should be retained as set forth by local regulation or best practices after an End User opts out of receiving messages.

Alternative Consent Requirements. While consent is always required and the consent requirements noted above are generally the safest path, consent can be received differently in the following scenarios:

  • Contact initiated by an individual. Customer is free to respond to a message first initiated by an individual without consent. For example, if an individual texts a Customer’s phone number asking for Customer’s hours of operation, Customer may respond directly to that individual, relaying the open hours. In such a case, the individual’s inbound message to Customer constitutes both consent and proof of consent. Such consent is limited only to that particular conversation. Unless Customer obtains additional consent, it shall not send messages that are outside the scope of that particular conversation.
  • Informational content to an individual based on a prior relationship. Customer may send a message to an individual with a prior relationship, provided that individual provided their phone number to Customer, and has taken some action to trigger the potential communication, and has not expressed a preference to not receive messages. Actions can include a button press, alert setup, appointments, or order placements. Examples of acceptable messages in these scenarios include appointment reminders, receipts, one-time passwords, order/shipping/reservation confirmations, drivers coordinating pick up locations with riders, and repair persons confirming service call times. The message cannot attempt to promote a product, convince someone to buy something, or advocate for a social cause.

Periodic Messages and Ongoing Consent. To send messages to a recipient on an ongoing basis, Customer should confirm the recipient’s consent by offering them a clear reminder of how to unsubscribe from those messages using standard opt-out language (defined below). Customer must also respect the message recipient’s preferences in terms of frequency of contact. Customer also needs to proactively ask individuals to reconfirm their consent as set forth by local regulations and best practices.

Identifying Yourself as the Sender. Customer must identify itself as the sender in every message it sends , except in follow-up messages of an ongoing conversation.

Opt-out. The initial message sent to an individual needs to include the following language: “Reply STOP to unsubscribe,” or the equivalent using another standard opt-out keyword, such as STOPALL, UNSUBSCRIBE, CANCEL, END, and QUIT.

  • Individuals must have the ability to revoke consent at any time by replying with a standard opt-out keyword. When an individual opts out, Customer may deliver one final message to confirm that the opt-out has been processed, but any subsequent messages are not allowed. To send any additional messages to an individual who has opted out, Customer must obtain consent again.

Usage Limitations

Prohibited Content. The key to ensuring that messaging remains a great channel for communication and innovation is preventing abusive use of messaging platforms. That means Telgorithm never allows certain types of content on Telgorithm Platform, even if a Customer obtains consent from recipients for that content. Telgorithm prohibits sending any content that is illegal, harmful, unwanted, inappropriate, objectionable, confirmed to be criminal misinformation, or otherwise poses a threat to the public, even if the content is permissible by law. Other prohibited uses include:

  • Anything that is illegal in the jurisdiction where the message recipient lives. 
  • Hate speech, harassment, exploitative, abusive, or any communications that originate from a hate group.
  • Fraudulent messages.
  • Malicious content, such as malware or viruses.
  • Any content that is designed to intentionally evade filters (e.g., Snowshoeing, etc).

Country-Specific Rules. All messages should comply with the rules applicable to the country in which the message recipient lives. 

Age and Geographic Gating. Additional restrictions apply to messages that include content in any way related to alcohol, firearms, gambling, tobacco, or other adult content. In addition to obtaining consent from every message recipient, Customer must ensure that no message recipient is younger than the legal age of consent based on where the recipient is located. Customer also must ensure that the message content complies with all applicable laws of the jurisdiction in which the message recipient is located or applicable communications industry guidelines or standards. Customer needs to be able to provide proof that it has in place measures to ensure compliance with such restrictions.

Messaging Policy Violation Detection and Prevention Evasion. Customers may not use our Telgorithm Platform to evade Telgorithm’s or a telecommunications provider’s unwanted messaging detection and prevention mechanisms. Examples of prohibited practices include:

  • Content designed to evade detection. As noted above, Telgorithm does not allow content which has been specifically designed to evade detection by unwanted messaging detection and prevention mechanisms. This includes intentionally misspelled words or non-standard opt-out phrases which have been specifically created with the intent to evade these mechanisms.
  • Snowshoeing. Telgorithm does not permit snowshoeing, which is defined as spreading similar or identical messages across many phone numbers with the intent or effect of evading unwanted messaging detection and prevention mechanisms.

Violations of AUP. When a violation of these principles is identified, where possible, Telgorithm will work with Customers in good faith to get them back into compliance with this policy. However, for protection of the continued ability of all Customers and End Users to freely use Telgorithm Platform for legitimate purposes, violations of this AUP by Customer or any End User may result in the immediate suspension or termination of Customer’s or End User’s use of the Telgorithm Platform, or civil and/or criminal liability. In any such event, Customer is still liable for any and all outstanding charges accumulated through the user of the Telgorithm Platform, including uses in violation of this AUP, the laws of any applicable jurisdiction, or applicable communications industry guidelines or standards. In addition, Telgorithm may investigate incidents that are contrary to this AUP and provide requested information to third parties who have provided notice to Telgorithm stating that they have been harmed by Customer or its End Users’ failure to abide by this AUP. Telgorithm’s failure to enforce this policy does not amount to a waiver of any of its rights hereunder. Violations of this AUP, including any prohibited content or communications, may be reported to https://www.telgorithm.com/help. Customer agrees to immediately report any violation of this AUP to Telgorithm and provide cooperation, as requested by Telgorithm, to investigate and/or remedy that violation. 

Changes To This AUP. Telgorithm reserves the right to change this AUP from time to time without notice by posting changes at https://www.telgorithm.com/policies/acceptable-use-policy/ and revising the “Last Updated” date of this AUP.