Guidelines for inclusion in the Security System

Procedures and criteria for community protection and regulatory

Christian Tico

Last Update 4 months ago

Inclusion in the Security System ensures a safe and compliant environment through these key criteria:

  1. Inappropriate Behavior
    • Verbal aggression, harassment, racist content, or hate speech trigger immediate system inclusion.
  2. Policy Violations
    • Sharing illegal material (child pornography, gore) or violating group guidelines leads to automatic blacklisting.
  3. Illegal Activities
    • Fraud, scams, copyright breaches, or fraudulent monetary requests via automated calls result in permanent sanctions.
  4. Privacy Breaches
    • Hacking attempts, phishing, malware distribution, or unauthorized data sharing lead to permanent bans.
  5. Right to Appeal
    • Users may request a transparent case review, with fair evaluation within defined timelines.
  6. Regular Updates
    • The blacklist is periodically revised to align with current laws and ensure fairness.

Was this article helpful?

1 out of 1 liked this article

Still need help? Message Us