We may share your Personal Information with our third-party service providers, agents, subcontractors, and other associated organizations, our group companies and affiliates in order to complete tasks, prAcceptable Use Policy
Version No 3. Last updated September 16, 2025.
This IPRoyal Services FZE LLC Acceptable Use Policy (the “ Use Policy “) sets out the rules applied to the use of services and systems as indicated in the IPRoyal Services FZE LLC Terms of Service.
1. General provisions and definitions
1.1 IPRoyal Services FZE LLC is a legal entity, incorporated in the United Arab Emirates, license No 4387, address BLB-BC5-641 (5th floor), AMC - BOULEVARD-B Building, 143 AL HASSAN AL BASRI STREET, JURF 2, Ajman, United Arab Emirates (the “ Company ”).
1.2 Any person using Company’s services/systems is considered to be a client of the Company (the “ Client ” / “ You ”).
1.3 The Company and the Client are legally bound by the Terms of Service (the “ Agreement ”) which governs the contractual relationship between the Company as a service provider and the Client, as any natural or legal person, as a service user, or a user of System prior to/without logging-in/creating an Account (Clause 2 of the Agreement).
1.3.1 The Company provides multiple IP address proxy infrastructure solutions, including IP addresses for the Clients to connect to the internet, and access to the Company’s data gathering and proxy management solutions (the “ Services ”). The Services can be reached and used via website www.iproyal.com (the “ System ”).
1.3.2 The latest version of Agreement shall be available at https://iproyal.com/terms-of-service/.
1.4 This Use Policy shall be applicable and interpreted in line with Agreement. The definitions set out in the Agreement and shall be applicable to this Use Policy.
1.5 You can contact the Company using a popup chat box in the System, filling a question box in the System in the “About us” section, as well as by sending an email to support@iproyal.com. For the matters regarding this Use Policy, we recommend contacting the Company via email, by sending Your inquiry to support@iproyal.com.
1.6 The Company shall have the right to unilaterally modify and/or update the Use Policy at any time without notice. The continuous use of the Services/System by the Client shall be deemed as acceptance of Use Policy in the last and most updated version. Any Client shall periodically check and assess the Use Policy.
1.7 The latest version of the Privacy Policy shall be available at https://iproyal.com/privacy/ .
1.8 By agreeing to the Agreement as per the rules set forth in the Agreement, You are automatically agreeing to the Use Policy.
1.9 If you disagree to be bound by the Use Policy in any scope or way, You must not use or must immediately cease Your use of the Services, System or any part of it, as well as its features and functionalities.
2. Prohibited activities and content
2.1 Below is a non-finite list of the types of prohibited activities and content on or through the System and Services.
2.2 The prohibited activities and content is defined as any act/content that offends against, is objectionable to, or is contrary to the public interest, public morality, public order, public and national security, or is otherwise prohibited by any applicable law, regulation, procedure, order or requirement.
2.3 While using the System and Services, You agree not to, and will not assist, encourage, or enable others to use the System and Services for/to (the “ Prohibited Activities ”):
2.3.1 Distribute cracks, warez, ROMs, virus, adware, worms, trojan horses, malware, spyware, or any other similar malicious software and products or any other computer code, files, or programs designed to interrupt, hijack, limit, destroy, or negatively affect the functionality of any computer software, hardware, network or telecommunications equipment.
2.3.2 Cause any network resource to be unavailable to its intended users, including, without limitation, via “denial-of-Service (DoS)” or “distributed denial-of-service (DDoS)” attacks.
2.3.3 Cause any damage or service disruption to any third-party computers or service.
2.3.4 The prohibition to use viruses and malicious programs always includes prohibition to:
2.3.4.1 Promote or support or contribute to establishing, publishing, distribution and development of malicious programs and viruses, hacking and piracy programs and the sites that provoke, promote, or publish information about how to hack networks, information technology devices or communications or having access to the same without right or to disrupt them in addition to the sites that provide supporting services for the above.
2.3.4.2 Support or provoke attacking information technology or communications networks for the purpose of disrupting the same.
2.3.5 Engage in or encourage any unlawful activity. Including but not limited to:
2.3.5.1 Provoking, calling for, promoting or providing information about how to carry out acts of crime or felony or contributing to or facilitate carrying out or supporting the same such as theft, fraud, robbery, forgery, faking, bribery, killing, suicide, blackmail, threat, rape, commercial cheating and breaching the properties of others, abduction, evasion from application of law, money laundry, smuggling prohibited content and other crimes punishable by the law.
2.3.5.2 Supporting or engaging in terrorism in any way, including but not limited to, by:
2.3.5.2.1 Creating, publishing, sharing, supporting any content relating to terrorist groups or any illegal group, association, organization or body or any content that facilitates communication with their leaders or members or to attract members or promote and favor their ideas or assist in financing their activities or contribute to assisting them actually or any content that publishes methods of making fire or explosive devices or any other tools used in terrorist acts.
2.3.5.2.2 Inciting, encouraging or enabling the commission of a crime against any country or one of its citizens or employees or its interests or public funds or public facilities abroad, including embassies, consulates, missions, or affiliate offices.
2.3.5.3 Practices of deception, fraud, theft and embezzlement.
2.3.5.4 Illegally compiling, publishing or allowing others to have access to bank statements or accounts, data, credit or electronic card numbers or any electronic payment method and also compiling, publishing or allowing others to have access to names, secret numbers or access codes to websites or information technology means such as email and others.
2.3.5.5 Impersonating or claiming status of others for fraudulent purposes.
2.3.5.6 Promoting witchcraft or other similar practices, especially such that might result in violations of human rights, including causing any physical harm.
2.3.5.7 Insulting, slandering or defamation.
2.3.6 Distribute any unlawful and illicit content.
2.3.6.1 For the avoidance of doubt, it is noted that illicit content might not be forbidden by law but is considered to be improper or socially forbidden as they go against social norms and values and can be assessed differently in different contexts. Such cases might be:
2.3.6.1.1 Pornography and nudity content.
2.3.6.1.2 Internet content that promotes or facilitates publishing or exchanging child pornography.
2.3.6.1.3 Internet content that motivates, supports, promotes, or publishes opinions that include aggression to public manners or involves corrupting youth or calling for embracing or promoting destructive principles.
2.3.6.1.4 Internet content that motivates and supports or promotes practice of vice, adultery, prostitution or illegal and unethical relations and the internet content related to human trafficking crimes or those including prostitution advertisements.
2.3.6.2 Internet content that promotes or is used for the purpose of trading immoral or forbidden by law goods or services, including, but not limited to:
2.3.6.2.1 Counterfeit money.
2.3.6.2.2 Hazardous waste.
2.3.6.2.3 Endangered species of animals, birds and plants or their members according to international treaties.
2.3.6.2.4 Counterfeit and fake goods.
2.3.6.2.5 Firearms, ammunition and explosives.
2.3.6.2.6 Illegal drugs. It is strictly prohibited to promote or contribute to trading with drugs and mind affecting substances and the manner of using or manufacturing the same or obtaining drugs or facilitating their circulation in circumstances that are not legally authorized.
2.3.6.3 The concept of unlawful and illicit content may differ depending on the location that You are using the System/Services from. At all times You are solely responsible for making sure that Your use of the System/Services is in compliance with applicable law, rules and moral requirements.
2.3.6.4 In all cases any abuse towards minors, any type of hate speech, threat of harm to health or life, manifestations of extremism, spread of disinformation and fake news, especially in socially sensitive topics as health, safety, human rights, etc., as well as incitement to do similar acts are considered as a breach of this prohibition.
2.3.7 Engage in or encourage discrimination, racism, and contempt of religion. Such actions may be:
2.3.7.1 Promoting, offending, defaming, insulting, ridiculing, or violating any of the religions or any of its rites, sanctities or divine books, or interfering with freedom to practice one’s religion by violence or threat.
2.3.7.2 Promoting or favoring what would raise sedition, hatred or racism or sectarianism or harming national unity or social peace or disturb the public order or public morals.
2.3.7.3 Promoting or creating any form of discrimination and provoking hate speech with intent to incite hatred between individuals and groups.
2.3.8 Violate third-party’s intellectual property rights. Any use of the System/Services for downloading or distributing pirated material, as well as any other form of intellectual property rights breach is considered as a breach of this prohibition. Such cases might be:
2.3.8.1 Providing and publishing movies, photos, drawings, books, electronic programs and games, encrypted TV and radio channels and other intellectual property rights in electronic form without legal right to do so.
2.3.8.2 Providing information, tools and methods aiming to infringing intellectual property rights and penetrating the protection means used for protecting such rights as decoding movies and coded TV channels and operation of copied magnetic diskettes and copied electronic programs and games and deactivation of protection systems designed exclusively for combating piracy.
2.3.9 Commit, engage or encourage any type of fraud, including but not limited to click fraud and generating fake traffic. An act of illegally clicking on pay-per-click ads or any other links by human, bots or software force to increase site revenue or to exhaust site‘s advertising budget, as well as to achieve any other goal such as to falsely increase a site’s audience in any site that is owned by You or any other person is considered as a breach of this prohibition.
2.3.10 Create dishonest social engagement such as creating and operating fake profiles in social media, creating fake reviews, leaving fake likes or generating shares / comments, conducting romance and other similar scams.
2.3.11 Conduct of privacy invasion, including but not limited to:
2.3.11.1 Using tools for phone tapping, espionage, theft or publication of private information or tracking, recording or intercepting communications or conversation without right.
2.3.11.2 Exposing news, photos or comments related to the private or family life even if it is true if publishing the same shall harm the concerned person in publication. In addition, this includes disclosure of a secret that may harm a person’s reputation, wealth or trade name or the publication of something intended to threaten or force them to pay money or provide benefit to others or be deprived of freedom to work.
2.3.11.3 Exposing medical examinations, medical diagnosis, medical treatment or care or medical records of other persons.
2.3.11.4 Internet content that allows access to private information illegally including those related to addresses and phone numbers of individuals or which allows disturbing others such as spam messages.
2.3.12 Enhance or operate a service or an entity that competes with the Services or assist any other party to do so.
2.3.13 Reproduce, duplicate, copy, resell or otherwise commercially exploit any part of the Services, any material of the System, or any intellectual property rights of the Company.
2.3.14 Overload the System or conduct web scraping without authorization.
2.3.15 Transfer the Account to any third party — this includes, but is not limited to, selling, gifting, or granting access to the Account to an unauthorized person — without the Company’s explicit prior consent.
2.4 The list indicated in Clause 2.3 of the Use Policy is non-finite.
2.5 As the Company is incorporated and based in the United Arab Emirates, any use of the System/Services shall be in accordance with the applicable local United Arab Emirates law, regulations, procedures and requirements. The Client acknowledges and agrees that the Client is solely responsible for making sure its activities are in accordance with such regulations. The Client shall always check the up-to-date legal information applicable to the usage of System/Services. The Company encourages the Client to seek professional legal advice in case of any doubt regarding the legality of its planned actions.
2.5.1 The Client is aware that United Arab Emirates Telecommunications and digital government regulatory authority is a body regulating the telecommunications sector.
2.5.2 The Client is aware that exemplary list of prohibited content categories applicable in accordance with the United Arab Emirates law is available on https://tdra.gov.ae/en/About/tdra-sectors/information-and-digital-government/policy-and-programs-department/internet-guidelines#prohibited-content-categories. The Company is not an owner of this website / its content and bears no responsibility in regard to it.
2.6 The Company encourages You to always act in accordance with the applicable laws, rules and regulations. You, as a Client, acknowledge and agree that You are solely responsible for the way You choose to use the System/Services and You solely bear any possible liability.
3. Blocked websites and disclosure of vulnerabilities
3.1 Access to website and web pages that contain prohibited content can be blocked by the internet service providers in your location. Furthermore, to ensure Your and public‘s interests, the Company is constantly trying to make its System/Services more safe.
3.2 The Company shall have a right to block access to any website while using the System/Services at its sole discretion.
3.3 The Company is currently blocking several websites for all new Clients that are using Residential Proxies Service. The full and up-to-date list of blocked websites is available at List of blocked websites. Some of the blocked websites might be accessible until the Client completes a certain action, for example, completes ID verification on such a website.
3.4 The Company is currently blocking several websites for all Clients that are using Datacenter Proxies and Static Residential Proxies Services. The full and up-to-date list of blocked websites is available at List of blocked websites. The indicated list is constructed due to security measures and includes .gov and bank websites, IMAP (ports 110, 993, 995, 143), and mail ports.
3.4.1 The Clients can access blocked .gov, bank sites, and IMAP websites by conducting ID verification.
3.4.2 In case the validity of the port was successfully checked, and it was acknowledged as not being spam, the Clients can access Mail ports by conducting ID verification.
3.5 The Company reserves the right to add or retract at any time and on its own discretion any website / content blocking. You should always check the available and up-to-date information regarding the website / content blocking before using System/Services.
3.6 The Company is encouraging You to share information on any violations of the Use Policy, as well as on any websites/data the Company should consider blocking. Furthermore, the Company encourages You to share any information regarding any security or technical issues You may notice/believe existing in the System/Services. The Client acknowledges and agrees that any sharing of information with the Company is voluntary, and that Client shall not be entitled to any financial reward.
4. Liability
4.1 The Clients are expected to exercise reasonable personal judgement when deciding which information, website or action is considered to be prohibited.
4.2 In addition to the liability clauses set forth in the Agreement, the Client agrees to defend, indemnify, and hold harmless the Company, its affiliates, and each of their respective directors, officers, employees, and agents from and against any and all third-party claims, demands, and liabilities, including reasonable attorney’s fees, resulting from or arising out of Client’s failure to comply with Client’s obligations under any and all laws, rules or regulations applicable to Client under the Agreement and Use Policy, as well as for any breach or violation of the rules of the Use Policy.
5. Miscellaneous
5.1 The English language version of this Use Policy is the prevailing version to any other possible version.
5.2 Certain provisions of this Acceptable Use Policy which by their nature are intended to survive—including but not limited to clauses relating to prohibited content and behavior, privacy violations, intellectual property infringements, and liability obligations—shall remain in full force and effect even after the Client ceases using the Account, Services or System and regardless of whether the Client retains access to their Account, Service or the System. These provisions shall continue to apply for as long as reasonably necessary to fulfil their intended purpose, including in cases where past use gives rise to legal, regulatory, or contractual consequences.
5.3 Any update of this Use Policy comes in force at the moment it is published at the System as indicated in Clause 1. By using the Services, You agree to be bound by any updated version of the Use Policy.
5.4 You are encouraged to contact us by the means indicated in the Agreement. Sending an email to support@iproyal.com shall be considered to be the primary means of communication.
5.5 The Company shall reply to Your inquiries within 30 days (with the possibility of two 30-day extensions).ovide the Services, and use of the Crypto.com mobile application to you on our behalf, and otherwise fulfill our obligations. When using third-party service providers, we request they respect the security of your Personal Information and treat it in accordance with the law.
We may share your Personal Information and other data you provide to us for the following purposes:
To verify your identity.
To detect and prevent fraud, money laundering, terrorist financing, and other financial crimes and illicit activities.
To facilitate the provision of services and relevant business operations to support our delivery of the Services and related aspects to you.
To improve our information, technology, and security systems including websites and mobile applications.
To provide customer service.
To promote our Services if you submit a product review or post content on public areas of our Services, or social media accounts.
To transfer our rights and duties under the relevant terms and conditions governing the use of any Services (to the extent allowed).
To comply, in our belief, with a legal request or to protect or enforce our rights, including to comply with an applicable law or regulation, or in response to a request for information if we believe disclosure is in accordance with any applicable law, regulation, or legal process, to protect against or prevent actual or potential fraud, unauthorized transactions, claims, or other liability, and to protect the rights, property, and safety of us or others.
To evaluate, effectuate, or otherwise transfer your personal information as part of a proposed or actual sale, merger, restructuring, transfer, or exchange of all or a portion of our assets to another company.
The categories of third parties with whom we may share your personal information for the purposes listed above include:
Companies and organizations that assist us in processing, verifying or refunding transactions or orders
Identity verification agencies
Fraud or crime prevention agencies
Anyone to whom we lawfully transfer or may transfer our rights and duties under the relevant terms and conditions governing the use of any of the Services
Any third party because of any restructure, sale or acquisition of our group or any affiliates
Regulatory and law enforcement authorities, where the law allows or requires us to do so
We disclose Personal Information to third parties only in accordance with applicable law.
6. Personal Information Security
While there is an inherent risk in any information being shared over the internet, we have put in place commercially reasonable security measures to prevent your Personal Information from being accidentally lost, used, damaged, or accessed in an unauthorized or unlawful way, altered, or disclosed. In addition, we limit access to your Personal Information to those employees, agents, contractors and other third parties who have a legitimate business need to know. They will only process your Personal Information on our instructions. You are also responsible for taking reasonable steps to protect your information against unauthorized disclosure or misuse such as by maintaining the confidentiality of your Personal Information.
We have put in place procedures to deal with any suspected personal data breach and will notify you and any relevant regulator of a qualifying breach when required.
If you want to know more about our security practice, please visit this link.
7. Personal Information retention
How long will you use my personal information for?
To determine the appropriate retention period for Personal Information, we consider the amount, nature, and sensitivity of the Personal Information, the potential risk of harm from unauthorized use or disclosure of your personal information, the purposes for which we process your personal information and whether we can achieve those purposes through other means, and the applicable legal, regulatory, tax, accounting or other requirements.
Here are some exemplary factors which we usually consider when determining how long we need to retain your Personal Information and data:
if we are dealing with a complaint;
if we reasonably believe there is a prospect of litigation in respect to our relationship with you or if we consider that we need to keep information to defend possible future legal claims, the respective personal information (e.g., email addresses and content, chats, letters) will be kept in accordance with the statutory limitation period applicable following the end of our relationship;
to comply with any applicable legal and/or regulatory requirements with respect to certain types of personal information, including relevant sanctions regimes:
under the Bank Secrecy Act and its related statutes we are obliged to retain your Personal Information for a period of at least 5 years after the end of our relationship;
information needed for audit purposes;
in accordance with relevant industry standards or guidelines;
in accordance with our legitimate business need to prevent abuse of the promotions that we launch. We will retain a customer’s personal information for the time of the promotion and for a certain period after its end to prevent the appearance of abusive behavior.
Illinois Residents – Biometric Information Privacy Act Disclosure
Unless otherwise required by an order from a court of competent jurisdiction or applicable law, if you are an Illinois resident, we may retain your biometric identifiers and biometric information until the earlier of (i) the initial purposes for collecting or obtaining such identifiers or information, including the purposes identified above, have been satisfied, or (ii) for three (3) years following your last interaction with us, whichever occurs first. As set forth in the “Biometric Information” section above, due to the nature of the compliance and legal obligations with which we must comply in order to provide certain services or products to you, the purpose for which we initially request biometric information from you may be ongoing, recurring, and/or indefinite for as long as you maintain an account with us.
See Addendum 1 – Biometric Information Privacy Policy.
Please note that under certain conditions, you can ask us to delete your Personal Information.
8. Your legal rights
Under certain circumstances, you may have certain rights in relation to your Personal Information:
Right to know about Personal Information collected, and how it is used and disclosed.
Right to request correction of certain Personal Information.
Right to request deletion of certain Personal Information.
Right to opt-out of the sharing of certain Personal Information.
If you wish to exercise any of the rights set out above or if you want to raise a question, complaint or a concern about our privacy policy and practices, please contact us at dpo@crypto.com. You may also contact us at our toll-free telephone number, +1 888-959-8091, or via mail at the physical address first listed above.
When allowed by applicable law and required, we will take steps to disclose and deliver to you, free of charge, your Personal Information accordingly. We may also contact you to ask you for further information in relation to your request to speed up our response.
If you are a California resident, you also have the right to know about Personal Information sold. In addition, you may also opt out of the sale of your personal information by clicking on the “Do Not Sell/Share My Personal Information” link here.
If you are a California resident, please also note that some of your Personal Information is subject to the Gramm-Leach-Bliley Act. Information we collect for the purposes of complying with the GLBA and its implementing regulations is not covered by the CCPA (and therefore may not be subject to deletion requests). However, other Personal Information of yours could still be subject to the CCPA.
Non-Discrimination
You will not receive a discriminatory treatment if you choose to exercise any of the rights conferred to you above.
If you want to make a request under the CCPA through a natural person or a business entity authorized to act on your behalf, please beforehand contact us and in a timely manner we will provide you with a reply on how to designate such a person.
No Code Website Builder