Acceptable Use Policy
Effective date: January 2026
This Acceptable Use Policy outlines the rules and guidelines for using Valid Email Checker's email verification services. By using our platform, you agree to comply with these guidelines, which are designed to ensure the service is used responsibly and legally by all users.
Intended use of our service
Valid Email Checker is designed to help businesses and individuals verify the deliverability of email addresses. The service is intended for legitimate purposes such as:
- Cleaning and maintaining your existing customer email lists
- Validating subscriber lists for newsletters and marketing communications
- Verifying leads collected through your own forms and landing pages
- Implementing real-time verification on registration and signup forms
- Integrating email verification into your CRM or marketing platforms
- Maintaining data quality for improved email deliverability
We provide a tool that checks whether email addresses are technically deliverable. The results help you make informed decisions about your email communications and maintain a healthy sender reputation. We do not provide guidance on whether you have permission to send messages to a given address — that determination depends on your relationship with the email owner, the consent you have obtained, and the laws applicable to your situation.
Your responsibilities
As a user of our service, you carry certain responsibilities:
Legal basis for processing
You are responsible for ensuring you have the legal right to process the email addresses you submit for verification. This includes having appropriate consent, legitimate interest, or another legal basis as required by applicable laws (GDPR, CCPA, CASL, CAN-SPAM, and any local equivalents).
Use of results
You are responsible for how you use the verification results. We can tell you whether an address is likely to accept mail; we cannot and do not tell you whether you have permission to send to that address. That determination is yours.
Compliance with email law
You must comply with all applicable laws and regulations, including but not limited to the CAN-SPAM Act (US), GDPR (EU/EEA), CASL (Canada), the UK Privacy and Electronic Communications Regulations, and any other email-marketing or data-protection rules that apply to your jurisdiction and the jurisdictions of your recipients.
Prohibited uses
Some uses are strictly prohibited and may result in immediate account termination without refund.
Spam and unsolicited email
You may not use the service to facilitate spam or unsolicited bulk email. This includes:
- Verifying email addresses for the purpose of sending unsolicited commercial messages
- Using the service to clean lists of people who never opted in to hear from you
- Attempting to circumvent anti-spam laws or regulations
- Verifying lists known to have been scraped, purchased without consent, or otherwise collected against the source operators' wishes
Our verification service is meant to help legitimate senders maintain healthy email lists, not to enable unwanted messages.
Illegal activities
You may not use the service for any illegal purpose, including but not limited to:
- Harassment, stalking, or threatening communications
- Fraud, phishing, or deceptive schemes
- Identity theft or impersonation
- Distribution of malware or malicious content
- Any activity that violates local, national, or international law
Service abuse
You may not abuse the platform or attempt to circumvent its protections:
- Attempting to bypass rate limits or other usage restrictions
- Using automated tools to circumvent security measures
- Sharing account credentials with unauthorized parties
- Creating multiple accounts to abuse free tiers or promotions
- Interfering with our service infrastructure or operations
- Reverse-engineering our verification technology
Purchased and third-party email lists
Our service will verify any addresses you submit, regardless of how you obtained them. However, verification does not constitute permission to send. You remain solely responsible for ensuring you have appropriate consent or a legitimate legal basis to contact any address, whether or not it passes our verification.
If you use purchased, rented, or otherwise acquired lists, you do so at your own risk. Many jurisdictions require explicit consent before sending commercial email, and purchased lists often do not include such consent. We strongly recommend consulting with legal counsel if you are unsure about your obligations.
API usage guidelines
Additional rules apply to API access:
- Keep your API keys secure. Do not share them publicly or with unauthorized parties.
- You are responsible for all activity that occurs using your API keys.
- Respect our rate limits. They exist to ensure fair access for all users.
- Attempting to circumvent rate limits may result in suspension of API access.
- You may integrate our API into your own applications. You may not resell API access directly without a partnership agreement.
- If you build a product that uses our verification service, your terms of service should include acceptable-use provisions aligned with this policy.
Team and multi-user accounts
If you have a team account, the account owner is responsible for ensuring all team members comply with this policy. Each team member must use their own login credentials — credential sharing between individuals is not permitted. The account owner may be held responsible for violations committed by team members using the shared credit pool. We recommend that account owners communicate these guidelines to all team members at onboarding time.
Monitoring and enforcement
We reserve the right to monitor usage patterns to detect violations of this policy. While we respect your privacy and do not examine the content of your email lists, we may analyze usage metadata (request volumes, API call patterns, IP origins, etc.) to identify potentially abusive behavior.
Consequences of violations
Depending on severity and intent:
- A warning for minor or first-time violations
- Temporary suspension of your account or API access
- Permanent termination of your account
- Forfeiture of remaining credits without refund
- Reporting to appropriate authorities for illegal activities
Severity scales with the nature of the violation, whether it appears intentional, your history with the service, and the impact on other users or third parties.
Reporting violations
If you believe someone is using our service in violation of this policy, report it to abuse@validemailchecker.com with as much detail as possible. We investigate all reports and take appropriate action.
Indemnification
By using our service, you agree to indemnify and hold harmless Valid Email Checker from any claims, damages, or expenses arising from your violation of this policy, your violation of any applicable law, your use of verification results, or any third-party claims related to emails you send after using our verification service.
Changes to this policy
We may update this Acceptable Use Policy from time to time to reflect changes in our service, legal requirements, or industry best practices. Changes are posted on this page with an updated revision date. Your continued use of the service after changes are posted constitutes acceptance of the updated policy. For significant changes that materially affect your rights or obligations, we provide notice via email to the address associated with your account.
Questions and contact
- Policy questions: support@validemailchecker.com
- Report abuse: abuse@validemailchecker.com
- Partnership inquiries: sales@validemailchecker.com
Related policies
Related questions
Still stuck? Email support
