1. Purpose
This Acceptable Use Policy ("AUP") defines the rules governing the use ofGo2 (the "Service"). The purpose of this policy is to:
- Protect our users, their end users, and the broader internet community
- Maintain the security, reliability, and reputation of our Service
- Ensure compliance with applicable laws and regulations
- Preserve the trust that users place in shortened links
This AUP is incorporated into and forms part of our Terms of Service. Violations of this policy may result in suspension or termination of your account.
2. Scope
This policy applies to all users of Go2, including:
- All shortened links created through our Service
- QR codes generated by our Service
- Custom domains connected to our Service
- API usage and integrations
- Any content or destinations linked through our Service
You are responsible for ensuring that your use of the Service, including all content you link to, complies with this policy.
3. Prohibited Content
You may not use Go2 to create links to content that:
3.1 Malware & Security Threats
- Contains viruses, trojans, worms, or other malicious software
- Attempts to install unwanted software on users' devices
- Exploits security vulnerabilities or performs drive-by downloads
- Contains ransomware or cryptomining code
3.2 Phishing & Fraud
- Impersonates other websites, companies, or individuals
- Attempts to steal login credentials, financial information, or personal data
- Conducts advance-fee fraud, lottery scams, or similar schemes
- Creates fake login pages or credential harvesting sites
3.3 Illegal Content
- Child sexual abuse material (CSAM) - immediate account termination and report to authorities
- Content that violates applicable laws in any jurisdiction
- Facilitates illegal drug trafficking
- Sells counterfeit goods or pirated content
- Promotes or facilitates human trafficking
- Provides instructions for creating weapons or explosives
3.4 Violence & Harmful Content
- Promotes terrorism or violent extremism
- Contains credible threats of violence against individuals or groups
- Glorifies or incites violence
- Contains graphic violence intended to shock or disturb
- Promotes self-harm or suicide
3.5 Hate Speech & Harassment
- Promotes hatred against individuals or groups based on race, ethnicity, religion, gender, sexual orientation, disability, or other protected characteristics
- Contains content intended to harass, bully, or intimidate individuals
- Doxes or shares private information without consent
3.6 Deceptive Content
- Misleads users about the destination or nature of the link
- Uses deceptive redirect chains to hide the final destination
- Spreads disinformation or dangerous medical misinformation
- Employs cloaking to show different content to users vs. our scanners
3.7 Intellectual Property Violations
- Infringes copyrights, trademarks, or other intellectual property rights
- Distributes pirated software, media, or other copyrighted materials
- Circumvents digital rights management (DRM) protections
4. Prohibited Activities
In addition to prohibited content, the following activities are not allowed:
4.1 Service Abuse
- Creating automated accounts or links in violation of our terms
- Attempting to circumvent rate limits or usage restrictions
- Using bots or automated tools without authorization
- Sharing or selling access to your account
- Creating accounts after being banned
4.2 Security Violations
- Attempting to gain unauthorized access to our systems or other users' accounts
- Probing, scanning, or testing the vulnerability of our systems without permission
- Interfering with or disrupting the integrity or performance of our Service
- Attempting to reverse engineer, decompile, or extract source code
4.3 Network Abuse
- Generating artificially inflated click counts or analytics data
- Using the Service for click fraud or ad fraud schemes
- Creating links designed to manipulate search engine rankings
- Using our infrastructure for denial-of-service attacks
4.4 Privacy Violations
- Collecting personal data through links without proper consent
- Using tracking features in ways that violate privacy laws
- Sharing analytics data in violation of data protection regulations
5. Link Scanning & Detection
We employ multiple layers of automated and manual review to detect and prevent abuse:
5.1 Automated Scanning
- Real-time analysis: All links are scanned at creation time
- Malware detection: Integration with threat intelligence databases
- Phishing detection: Pattern matching and URL analysis
- Continuous monitoring: Links are periodically re-scanned
5.2 Intelligence Sources
We integrate with industry-standard threat intelligence sources, including:
- Google Safe Browsing
- PhishTank
- Cloudflare threat intelligence
- Community-reported threats
5.3 Detection Accuracy
While we strive for high accuracy, no automated system is perfect. If you believe a link was incorrectly flagged, please use our appeals process (Section 10).
6. Spam Policy
Go2 must not be used to distribute spam or unsolicited commercial messages.
6.1 Definition of Spam
Spam includes but is not limited to:
- Unsolicited bulk emails containing Go2 links
- Mass messaging on social media platforms
- Comment spam on blogs, forums, or websites
- SMS spam or robocalls containing our links
- Pop-up or pop-under advertisements
6.2 Email Requirements
If you use Go2 links in email marketing:
- You must comply with CAN-SPAM, GDPR, and other applicable regulations
- Recipients must have opted in to receive your communications
- You must provide a working unsubscribe mechanism
- Your emails must include valid sender identification
6.3 Social Media
You must comply with the terms of service of any platform where you shareGo2 links. Automated or excessive posting may trigger our abuse detection.
7. Fair Use
All Go2 accounts are subject to fair use limits to ensure service quality for all users.
7.1 Usage Guidelines
- Use the Service in a manner consistent with normal business operations
- Do not create an excessive number of links that are never used
- Respect API rate limits for your subscription tier
- Do not use the Service in ways that degrade performance for others
7.2 Resource Limits
Accounts that consistently consume excessive resources may be contacted to discuss upgrading to an appropriate plan or optimizing their usage.
7.3 Inactive Links
We reserve the right to deactivate links that have been inactive for extended periods on free accounts. We will provide notice before taking such action.
8. Enforcement
We take a graduated approach to enforcement, with actions proportional to the severity and pattern of violations.
8.1 Link-Level Actions
- Warning page: Users see a warning before proceeding to the destination
- Link disabled: The link is deactivated and returns an error
- Link deleted: The link is permanently removed from our system
8.2 Account-Level Actions
- Warning: Notification of the violation with required corrective action
- Temporary suspension: Account access restricted for a period
- Permanent ban: Account terminated with no possibility of reinstatement
8.3 Immediate Termination
Certain violations result in immediate account termination without warning:
- Distribution of child sexual abuse material (CSAM)
- Malware distribution
- Phishing operations
- Terrorism-related content
- Repeated violations after warnings
8.4 Cooperation with Authorities
We cooperate with law enforcement agencies and may report illegal activity. We are required to report CSAM to the National Center for Missing & Exploited Children (NCMEC) and relevant authorities.
9. Reporting Abuse
We encourage users and the public to report suspected policy violations.
9.1 How to Report
You can report abusive links or accounts by:
- Email: abuse@go2.gg
- Report form: Available on our warning pages when you encounter a flagged link
- API: Enterprise customers can use our abuse reporting API
9.2 What to Include
When reporting, please include:
- The Go2 short link URL (e.g., go2.gg/abc123)
- Description of the violation
- Any evidence (screenshots, emails, etc.)
- Your contact information (optional but helpful)
9.3 Response Time
We review all abuse reports within 24 hours. Critical reports (CSAM, active phishing) are prioritized and typically addressed within 1 hour.
9.4 Confidentiality
Reporter information is kept confidential and not shared with the reported party unless required by law.
10. Appeals Process
If you believe an enforcement action was taken in error, you have the right to appeal.
10.1 How to Appeal
Submit an appeal to appeals@go2.gg with:
- Your account email or the affected link URL
- Explanation of why you believe the action was incorrect
- Any supporting evidence
10.2 Appeal Timeline
- Appeals must be submitted within 30 days of the enforcement action
- We will review and respond within 7 business days
- Complex cases may require additional time
10.3 Appeal Outcomes
- Upheld: The original decision stands
- Overturned: The action is reversed and access restored
- Modified: The action is changed to a lesser enforcement
10.4 Final Decision
Our decision on appeal is final. Repeated frivolous appeals may be considered harassment and result in additional enforcement action.