Policy
Reports & Complaints Policy
This policy defines how to report legal, privacy, safety, platform, referral, tracking, API, and child safety
concerns across all Ronan Hayes services. It includes the full CSAM response protocol in this same document.
Quick Summary
This summary is for quick reading. The complete documented process below is the controlling policy.
Send Evidence
Include exact URLs, IDs, timestamps, screenshots, and a clear explanation of the issue.
Branch by System
Use the domain-specific branch matching the affected site, link, referral flow, or API route.
CSAM Is In This Policy
Child safety handling is defined in Section 4, including immediate restrictions and escalation.
Fastest Resolution
Complete reports are prioritized; incomplete submissions may be delayed pending clarification.
1. Purpose and Scope
This policy applies to complaints and reports involving content, impersonation, intellectual property,
referral fraud, short-link abuse, API misuse, privacy rights, unauthorized access, and other policy breaches
across covered domains and services.
Reports may be submitted by users, rights holders, partners, security researchers, or impacted third parties.
2. Required Report Content
To begin review, provide as much of the following as available:
- Reporter name and best reply email.
- Affected domain and full URL(s) or endpoint path(s).
- Date/time range in UTC if possible.
- Relevant IDs (referral ID, promo ID, slug, request ID, campaign ID, verification timestamp if applicable).
- Evidence attachments (screenshots, logs, messages, ownership proof).
- Requested remedy (remove content, disable link, review event, revoke key, etc.).
Intentionally false or materially misleading reports may be rejected and may result in reporting restrictions.
3. Domain and System Routing
Select the branch matching the impacted system. If a report affects multiple branches, include all relevant
branches in one submission so investigation can be coordinated.
Branch A: Main Site and Corporate Content (ronanhayes.net)
Use for policy violations on the corporate site and published legal pages.
- Report types: impersonation, unauthorized content use, trademark misuse, false representation.
- Required evidence: exact URL, ownership/authorization proof, and requested action.
- Possible outcomes: correction request, takedown, publishing restrictions, access suspension.
Branch B: Client Subdomains and Link Trees (e.g., angel.ronanhayes.net)
Use for creator page abuse, profile misuse, and unauthorized or unsafe link listing issues.
- Report types: impersonation, stolen identity signals, abusive outbound linking, policy violations.
- Required evidence: profile URL, screenshots, ownership claim details, chronology of events.
- Possible outcomes: link removal, profile edit requirements, temporary lock, escalation review.
Branch C: Promo and Referral Systems
Use for campaign abuse, fake traffic, payout disputes, or referral-attribution manipulation.
- Report types: click inflation, bot events, self-referral loops, duplicate conversion claims.
- Required evidence: referral or promo identifiers, timestamps, source channels, and dispute context.
- Possible outcomes: event reprocessing, freeze/void of events, campaign restrictions, enforcement action.
Branch D: Tracking and Redirect Layer (track.ronanhayes.net)
Use for malicious redirect behavior, unsafe destination routing, and short-link abuse.
- Report types: malware redirects, phishing destinations, unauthorized slug use, link hijacking claims.
- Required evidence: short URL, destination URL, event timestamps, and any warning indicators.
- Possible outcomes: immediate link disablement, route quarantine, slug reassignment, permanent blocklist.
Branch E: API Platform (api.ronanhayes.net)
Use for endpoint abuse, token compromise, suspicious traffic patterns, and integration policy breaches.
- Report types: brute-force attempts, unauthorized access, key leakage, abusive request automation.
- Required evidence: endpoint path, method, request IDs, logs, and affected integration details.
- Possible outcomes: key rotation, token revocation, endpoint throttling, client suspension.
Branch F: Privacy and Data Rights
Use for access, correction, deletion, tracking clarification, and verification-data handling requests.
- Report types: privacy rights requests, tracking objections, data correction disputes, verification disputes.
- Required evidence: identity verification context, relevant submission details, and requested action scope.
- Possible outcomes: verified data export, correction, deletion where permissible, or legal hold notice.
4. CSAM Zero-Tolerance and Emergency Protocol
Ronan Hayes Management maintains a zero-tolerance policy for child sexual abuse material (CSAM), child sexual
exploitation content, or any conduct that facilitates exploitation of minors. This section is the controlling
CSAM policy for all covered services.
4.1 Immediate Response
- Potentially impacted content, links, assets, and routes are disabled or quarantined without delay.
- Related accounts, credentials, and API access may be suspended pending investigation.
- Relevant logs and operational records may be preserved for lawful investigation and mandatory reporting.
- CSAM incidents are triaged as critical and escalated immediately.
4.2 Reporter Requirements for CSAM Incidents
- Provide exact URL(s), short link(s), endpoint path(s), and timestamps.
- Include screenshots or evidence needed to locate the incident quickly.
- Include urgent context where immediate harm risk exists.
- Use email subject:
[CSAM] Urgent Report - [Domain/Path].
4.3 CSAM Branch Handling
CSAM Branch A: Main Site and Corporate Pages (ronanhayes.net)
- Any credible indicator triggers immediate takedown and containment controls.
- Publishing access may be restricted until review and legal obligations are complete.
CSAM Branch B: Client Subdomains and Link Trees (e.g., angel.ronanhayes.net)
- Impacted profile links and assets are disabled immediately.
- Associated account access may be fully restricted pending outcome.
CSAM Branch C: Tracking and Redirect Layer (track.ronanhayes.net)
- Suspected short links are blocked immediately and may be permanently invalidated.
- Route mappings and request records may be preserved for lawful escalation.
CSAM Branch D: API Platform (api.ronanhayes.net)
- API tokens or integrations linked to CSAM risk may be revoked immediately.
- Endpoint telemetry may be retained for legal cooperation and incident response.
4.4 Mandatory Escalation
The Company follows applicable legal obligations for reporting and cooperation with authorized child safety
channels and law enforcement. If a child is in immediate danger, contact emergency services first. In the
United States, online child sexual exploitation may also be reported to NCMEC CyberTipline.
5. Review Workflow and Response Targets
-
Intake and Acknowledgment: Initial acknowledgment is typically sent after basic report validation.
-
Triage: Severity, legal exposure, and security risk are evaluated; urgent threats are prioritized.
-
Evidence Review: Logs, records, and supporting documents are compared to policy requirements.
-
Action Decision: Content, links, keys, or access rights may be modified, restricted, or removed.
-
Closure Notice: Reporter receives outcome status when legally and operationally permissible.
Timelines vary by report complexity, legal process, and evidence quality. Emergency safety matters may be acted on immediately.
6. Possible Outcomes
- No action if report is unsupported, out of scope, or contradicted by verified evidence.
- Informal corrective notice with required remediation steps and monitoring window.
- Content, route, campaign, or integration restrictions pending additional investigation.
- Permanent removal, key revocation, account suspension, or legal escalation where warranted.
- Data-rights handling according to the Privacy Policy and applicable law.
7. Appeals and Reconsideration
If you believe an outcome was materially incorrect, you may submit a reconsideration request with new,
specific evidence not included in the original report. Repetitive submissions without additional evidence
may be closed without further review.
8. Abuse of Reporting Process
Abuse of this process, including knowingly false claims, harassment submissions, or attempts to disrupt
operations through fabricated complaints, may lead to report rejection and access restrictions.
9. How to Submit
Send reports to contact@ronanhayes.net with a clear subject line:
[Branch + Issue Type] - Short Description. For child-safety reports, use the CSAM subject format
listed in Section 4.
Include the required evidence checklist from Section 2 to avoid intake delays.
10. Policy Updates
This policy may be updated to reflect legal developments, infrastructure changes, or improved safety controls.
Continued use of covered services after updates indicates acceptance of the revised process.