Acceptable Use Policy
Last Updated: January 2026
Purpose of This Policy
This Acceptable Use Policy outlines the rules and guidelines for using Valid Email Checker's email verification services. By using our platform, you agree to comply with these guidelines, which are designed to ensure that our service is used responsibly and legally by all users.
Intended Use of Our Service
Valid Email Checker is designed to help businesses and individuals verify the deliverability of email addresses. Our service is intended for legitimate purposes including cleaning and maintaining your existing customer email lists, validating subscriber lists for newsletters and marketing communications, verifying leads collected through your own forms and landing pages, implementing real-time verification on registration and signup forms, integrating email verification into your CRM or marketing platforms, and maintaining data quality for improved email deliverability.
We provide a tool that checks whether email addresses are technically deliverable. The results help you make informed decisions about your email communications and maintain healthy sender reputation.
Your Responsibilities
As a user of our service, you bear certain responsibilities. You are responsible for ensuring that you have the legal right to process the email addresses you submit for verification. This includes having appropriate consent, legitimate interest, or other legal basis as required by applicable laws.
You are also responsible for how you use the verification results. While we can tell you whether an email address is likely to accept messages, we cannot and do not provide guidance on whether you have permission to send messages to that address. That determination depends on your relationship with the email owner, the consent you've obtained, and the laws applicable to your situation.
You must comply with all applicable laws and regulations, including but not limited to the CAN-SPAM Act, GDPR, CASL, and other email marketing and data protection regulations that apply to your jurisdiction and the jurisdictions of your email recipients.
Prohibited Uses
Certain uses of our service are strictly prohibited and may result in immediate account termination without refund.
Spam and Unsolicited Email
You may not use our service to facilitate spam or unsolicited bulk email. This includes verifying email addresses for the purpose of sending unsolicited commercial messages, using our service to clean lists of people who have never opted in to receive communications from you, or attempting to circumvent anti-spam laws or regulations.
We take spam seriously. Our verification service is meant to help legitimate senders maintain healthy email lists—not to enable unwanted messages that harm recipients and damage the email ecosystem.
Illegal Activities
You may not use our service for any illegal purpose. This includes but is not limited to harassment, stalking, or threatening communications, fraud, phishing, or deceptive schemes, identity theft or impersonation, distribution of malware or malicious content, and any activity that violates local, national, or international law.
Service Abuse
You may not abuse our service or attempt to circumvent its protections. Prohibited activities include attempting to bypass rate limits or other usage restrictions, using automated tools to circumvent security measures, sharing account credentials with unauthorized parties, creating multiple accounts to abuse free tiers or promotions, interfering with our service infrastructure or operations, and reverse engineering our verification technology.
Purchased and Third-Party Email Lists
We recognize that businesses sometimes acquire email lists through various means. We want to be transparent about our position on this matter.
Our service will verify any email addresses you submit, regardless of how you obtained them. However, verification of deliverability does not constitute permission to send emails. You remain solely responsible for ensuring you have appropriate consent or legal basis to contact any email addresses, regardless of whether they pass our verification.
If you use purchased, rented, or otherwise acquired email lists, you do so at your own risk. Many jurisdictions require explicit consent before sending commercial emails, and purchased lists often do not include such consent. We strongly recommend consulting with legal counsel if you're unsure about your obligations.
API Usage Guidelines
If you access our service through our API, additional guidelines apply. You must keep your API keys secure and not share them publicly or with unauthorized parties. You are responsible for all activity that occurs using your API keys.
You must respect our rate limits, which exist to ensure fair access for all users. Attempting to circumvent rate limits may result in temporary or permanent suspension of API access. If you require higher limits for legitimate business needs, please contact our support team to discuss your requirements.
You may integrate our API into your own applications, but you may not resell API access directly without a partnership agreement. If you build a product that uses our verification service, your terms of service should include acceptable use provisions that align with this policy.
Team and Multi-User Accounts
If you have a team account with multiple users, the account owner is responsible for ensuring all team members comply with this policy. Each team member should use their own login credentials—sharing login credentials between individuals is not permitted.
The account owner may be held responsible for violations committed by team members using the shared credit pool. We recommend that account owners communicate these guidelines to all team members.
Monitoring and Enforcement
We reserve the right to monitor usage patterns to detect violations of this policy. While we respect your privacy and do not examine the content of your email lists, we may analyze usage patterns, API calls, and other metadata to identify potentially abusive behavior.
Consequences of Violations
Violations of this policy may result in a warning for minor or first-time violations, temporary suspension of your account or API access, permanent termination of your account, forfeiture of remaining credits without refund, and reporting to appropriate authorities for illegal activities.
The severity of the response depends on the nature and severity of the violation, whether it appears intentional, your history with our service, and the impact on other users or third parties.
Reporting Violations
If you believe someone is using our service in violation of this policy, please report it to abuse@validemailchecker.com. Include as much detail as possible about the suspected violation. We investigate all reports and take appropriate action.
Indemnification
By using our service, you agree to indemnify and hold harmless Valid Email Checker from any claims, damages, or expenses arising from your violation of this policy, your violation of any applicable law, your use of verification results, and any third-party claims related to emails you send after using our verification service.
Changes to This Policy
We may update this Acceptable Use Policy from time to time to reflect changes in our service, legal requirements, or industry best practices. Changes will be posted on this page with an updated revision date. Your continued use of our service after changes are posted constitutes acceptance of the updated policy.
For significant changes that materially affect your rights or obligations, we will provide notice via email to the address associated with your account.
Questions and Contact
If you have questions about this policy or are unsure whether a particular use is permitted, please contact us before proceeding:
Policy Questions: support@validemailchecker.com
Report Abuse: abuse@validemailchecker.com
Partnership Inquiries: sales@validemailchecker.com
We're happy to clarify any aspect of this policy and help you use our service responsibly.