Disclaimer, Support Terms, License, and Data Processing Policy
This document (hereinafter referred to as the “Policy”) sets forth the terms of use for software products and services distributed by ZloyTeam, including (but not limited to) ZloyRouter and ZloyProxy (hereinafter referred to as the “Software”), and must be read and accepted by all users (hereinafter referred to as the “User”). The developer of the Software is ZloyTeam (hereinafter referred to as the “Developer”).
Important: This document is not a contract for the transfer of exclusive rights. All exclusive rights to the Software belong to the Developer (and/or other rights holders, if applicable).
1. Provision on an “As Is” Basis
The Software is a complex technical tool and is provided on an “as is” and “as available” basis. The Developer makes no warranties, express or implied, regarding:
- the error-free, uninterrupted, and continuous operation of the Software;
- the Software’s suitability for the User’s specific purposes, requirements, and expectations;
- the achievement of specific metrics (speed, latency, “quality score,” “fraud score,” passing checks/tests, etc.);
- the successful bypassing of any existing or future anti-fraud/anti-bot/anti-spam systems, as their algorithms are regularly updated and depend on a multitude of factors, including (but not limited to) behavioral profile, device parameters, network environment, quality of consumables (proxies, VPNs, accounts, payment methods), geography, and provider policies;
- compatibility with any third-party hardware (other than recommended), software, or services (proxy servers, VPN providers, routers, custom firmware, provider-side DPI/filtering, etc.) .
2. Limitation of Liability
Under no circumstances shall the developer be liable for any direct, indirect, incidental, special, or consequential damages, including but not limited to:
- financial losses or lost profits;
- blocking, restrictions, enhanced verification, or other sanctions imposed by any third-party platforms/services;
- loss or compromise of data;
- legal consequences arising from the use of the software in violation of laws, regulations, and/or the terms of use of third-party services;
- any issues arising from the use of third-party services (proxies/VPNs), substandard equipment, unstable power supply, overheating, network restrictions, national blocks, DPI, etc.;
- damage caused by incorrect configuration by the User or third parties, as well as disregard for documentation/instructions.
The effectiveness of the Software depends on numerous external factors over which the Developer has no control.
3. User Responsibility and Permitted Use Scenarios
3.1. The User fully understands and assumes all risks associated with the installation and use of the Software. The User bears full and sole responsibility for:
- selecting and purchasing compatible hardware, network infrastructure, and a quality power supply (including power supply unit/cable/cooling);
- selecting, verifying, and paying for third-party services (proxy/VPN/hosting), as well as the consequences of their instability, blocking, or logging by such services;
- the correct configuration and security of their local network (passwords, access, Wi-Fi, routing, firewall, OS updates, backups);
- compliance with the laws of your jurisdiction and the rules of third-party services.
3.2. The software is a network routing/integration tool, not a “magic button.” The developer does not guarantee:
- “absolute anonymity” or “impossibility of deanonymization”;
- the absence of any traces on the side of external providers/services/platforms;
- passing any anti-fraud/anti-bot checks and the absence of additional verifications (SMS, email, KYC, etc.).
3.3. Prohibited Use. The User agrees not to use the Software for actions that violate applicable laws, the rights of third parties, or the terms of use of third-party platforms/services. The Developer does not provide advice or instructions on how to commit illegal acts.
3.4. Support and Diagnostics — Mandatory Requirement.
- When contacting support, the User is required to provide the requested diagnostic data (logs/dumps/reports) collected in accordance with the Developer’s official instructions.
- Without diagnostic data, the Developer generally cannot reproduce the problem, determine the cause, or provide a correct solution. In this case, assistance may be limited to general recommendations.
- The User understands that some issues may be caused by third-party factors (VPN/proxy/ISP/national blocks/hardware), and resolving them may require contacting the support of the relevant third-party services.
3.5. Communication and Timelines. The User acknowledges that support responses are provided during business hours or as the Developer is able, and may depend on the complexity of the case and the need to forward information to the developer.
4. License Terms (Prohibition on Resale and Transfer)
4.1. License — Non-Exclusive and Revocable.
By purchasing a license for the Software, the User obtains a non-exclusive, non-transferable right to use the Software to the extent and for the term specified by the selected pricing plan/license period, exclusively for the User’s own needs, unless otherwise expressly agreed upon by the Developer in writing.
4.2. Exclusive rights are not transferred. The purchase of a license (including payment) does not imply:
- the transfer of exclusive rights to the Software to the User;
- the sale of the Software as an object of intellectual property;
- the granting to the User of the right to dispose of the Software or the license as property (including resale).
All exclusive rights to the Software (including source code, object code, design, architecture, documentation, names, and other elements) remain with the Developer and/or other rights holders.
4.3. Prohibition on Resale/Assignment/Sublicensing. The User is prohibited from doing the following without the Developer’s prior written consent:
- selling, reselling, giving away, exchanging, assigning, transferring, or otherwise disposing of the license (in whole or in part) to third parties;
- grant sublicenses, lease the license/access, or act as a reseller/distributor;
- provide third parties with access to the personal account/keys/activation data (if applicable) or any data that allows third parties to use the license.
4.4. Device Binding and Transfer. The license may be bound to specific hardware (e.g., a Raspberry Pi hardware hash). Upon the User’s request, the Developer may transfer the license to the User’s new device in the manner prescribed by the Developer (e.g., upon replacement or failure of the device). The number/frequency of transfers may be limited to prevent abuse.
4.5. Breach of License Terms. In the event of a breach of the terms of this section, the Developer shall have the right (at its sole discretion and without prejudice to other legal remedies):
- to suspend or terminate the license;
- refuse support;
- apply technical protective measures (including deactivation);
- demand that the violation cease.
5. Data Processing Policy and Privacy
The Developer values the User’s privacy and adheres to the principle of data minimization.
5.1. On-premises model. The software runs on the User’s equipment. The Developer does not have remote access to the User’s device and does not access the User’s network traffic unless the User explicitly grants such access themselves.
5.2. Traffic and network data. The Developer:
- does not collect or store the content of the User’s traffic;
- does not sell or transfer data about the User’s traffic to third parties.
5.3. Diagnostic data.
When contacting support, the User may voluntarily provide diagnostic logs, which may contain technical information about the system (software versions, network settings, errors). The User is solely responsible for ensuring that no unnecessary credentials (passwords/tokens/keys) are transmitted to support unless specifically required by the instructions. The Developer uses diagnostic data only for analyzing and resolving issues and may delete it after the work is completed (where possible).
5.4. License Activation. To bind and activate the license, the Developer processes the device’s unique hardware hash. This hash is intended solely for license management and is not personal data in itself, does not reveal the content of traffic, and does not provide the Developer with access to the device.
The purchase, installation, or use of the Software constitutes the User’s full and unconditional acceptance of these terms.