Policy
Terms of Service
These Terms of Service govern access to and use of the Ronan Hayes web ecosystem, including the primary site,
creator subdomains, promotional and referral systems, short-link and redirect services, and the public API.
Quick Summary
This is a plain-language summary. It is provided for convenience and does not replace the full legal terms below.
Use It Lawfully
All services must be used in compliance with law, platform rules, and these terms.
Fraud Is Prohibited
Referral manipulation, fake traffic, token misuse, and abusive automation are not allowed.
Access Can Be Revoked
We may suspend links, endpoints, or accounts if we detect abuse, security risk, or legal violations.
API + Verification Controls
Operational checks and security logs are used for reliability, identity checks, and system safety.
1. Acceptance of Terms
By accessing or using any covered service, you confirm that you have read, understood, and agreed to these
Terms of Service. If you do not agree, you must discontinue use immediately.
These terms apply to all visitors, applicants, collaborators, partners, API consumers, and anyone interacting
with managed properties, whether access occurs directly or through links, referral routes, embeds, or integrations.
2. Definitions
- "Company" means Ronan Hayes Management and authorized operators of covered systems.
- "Services" means websites, creator pages, short-link infrastructure, promo/referral tooling, and API resources.
- "User" means any person or entity accessing or interacting with the Services.
- "Referral Data" means IDs, campaign tags, source metadata, and attribution events tied to traffic flows.
- "API Credentials" means keys, tokens, or secrets used to authenticate programmatic access.
3. Scope and Service Branches
Branch-specific controls apply in addition to these core terms. Where branch requirements differ, the stricter
rule governs for that branch.
Branch A: Main Site and Corporate Pages (ronanhayes.net)
- Covers public marketing pages, contact workflows, legal policy pages, and published statements.
- Application workflows may require identity verification checks before submissions are accepted.
- Prohibits unauthorized copying, impersonation, scraping abuse, and interference with site availability.
- Company may remove or edit content to satisfy legal, operational, or safety obligations.
Branch B: Client Subdomains and Link Trees (e.g., angel.ronanhayes.net)
- Covers managed creator pages, profile presentation, and outbound link routing configuration.
- Requires truthful identity representation and lawful promotion of services and offerings.
- Company may restrict access, disable entries, or alter publishing controls for policy compliance.
Branch C: Promo + Referral Systems
- Covers campaign links, referral attribution, traffic qualification, and performance reporting.
- Prohibits click farms, bot activity, self-referral loops, fabricated events, and payout manipulation.
- Attribution records may be adjusted, withheld, or voided when integrity checks detect abuse signals.
Branch D: Tracking and Redirect Layer (track.ronanhayes.net)
- Covers short links, redirects, slug reservations, and destination routing logic.
- Prohibits phishing, malware destinations, credential harvesting, and deceptive redirect behavior.
- High-risk links may be blocked without notice to contain security or legal risk.
Branch E: API Platform (api.ronanhayes.net)
- Covers endpoint access, documentation use, request traffic, and integration behavior.
- Requires safe handling of tokens and prohibits unauthorized enumeration, extraction, or evasion tactics.
- Rate limits, authentication requirements, and endpoint behavior may change for reliability or security.
4. Eligibility and Legal Compliance
- You must be legally permitted to use the Services under applicable law.
- You must comply with all local, state, federal, and international rules that apply to your activity.
- You must provide truthful and authorized materials when identity verification is required in workflows.
- You are solely responsible for ensuring that your use complies with third-party platform requirements.
- You may not use the Services for illegal content, harassment, fraud, or unauthorized data exploitation.
5. Account Security and Credential Management
Users are responsible for all actions performed using their accounts, credentials, devices, and integrations.
You must immediately notify the Company of suspected compromise, unauthorized use, or leaked secrets.
- Do not share API credentials, admin links, or privileged access with unauthorized parties.
- Use strong authentication controls and promptly rotate compromised keys or tokens.
- Security controls may require temporary lockouts or additional verification for high-risk activity.
6. Acceptable Use Restrictions
- No denial-of-service actions, vulnerability probing without authorization, or route-level abuse.
- No unauthorized scraping that degrades service performance or circumvents access restrictions.
- No reverse engineering of private systems where prohibited by law or contract.
- No deceptive behavior, identity misrepresentation, social engineering, or payment fraud schemes.
- No altered, misleading, or unauthorized submissions in identity verification workflows.
- No attempts to alter attribution or reporting outcomes through synthetic or manipulated traffic.
7. Referral, Promotion, and Attribution Terms
Referral and promotion systems are provided for legitimate campaign measurement. Attribution is conditional
on valid traffic quality and policy-compliant behavior.
- Campaign qualification rules may be changed at any time to prevent abuse and preserve integrity.
- Disputed attribution events may be reviewed, corrected, suspended, or rejected after investigation.
- The Company may retain anti-fraud evidence, including logs and pattern indicators, to support enforcement.
- Program access may be restricted for repeated compliance failures or unresolved risk findings.
8. Intellectual Property and Brand Rights
All site materials, design elements, copy, source assets, operational frameworks, and brand identifiers are
protected by applicable intellectual property laws. No transfer of ownership is granted through use.
- You may not republish, resell, or redistribute protected materials without written authorization.
- You may not imply endorsement, affiliation, or sponsorship without express approval.
- Trademark and takedown matters should be reported through the reports process.
9. Third-Party Services and External Destinations
Services may contain links or redirects to third-party platforms not controlled by the Company. Those
destinations operate under their own terms and privacy policies. The Company does not control third-party
uptime, security posture, or policy changes.
10. Investigations, Enforcement, and Termination
The Company may investigate suspected misconduct and may take enforcement action without prior notice where
necessary to protect users, systems, or legal interests.
- Actions may include warning notices, temporary suspension, permanent revocation, and route disablement.
- Submissions that fail verification checks or trigger fraud indicators may be delayed, rejected, or escalated.
- API keys, links, campaigns, and account-level privileges may be rotated or revoked during containment.
- Legal requests and urgent safety issues may trigger accelerated response procedures.
11. Disclaimers
Services are provided on an "as is" and "as available" basis. To the fullest extent permitted by law, the
Company disclaims warranties of uninterrupted availability, fitness for a particular purpose, non-infringement,
and guaranteed business outcomes.
12. Limitation of Liability
To the maximum extent permitted by law, the Company will not be liable for indirect, incidental, special,
consequential, or punitive damages, including loss of profits, traffic value, referral outcomes, goodwill,
or data opportunities arising from use of the Services.
13. Indemnification
You agree to defend, indemnify, and hold harmless the Company and its operators from claims, liabilities,
damages, and expenses (including reasonable legal fees) arising from your misuse of Services, policy breach,
or unlawful conduct.
14. Policy Hierarchy and Related Documents
15. Governing Law and Dispute Handling
These terms are interpreted under applicable United States law and any other controlling legal requirements.
Where permitted, disputes should first be raised by written notice to allow good-faith business resolution
before formal proceedings.
16. Changes to These Terms
The Company may update these terms to reflect legal requirements, operational changes, new services, or
security controls. Continued use of Services after updates constitutes acceptance of revised terms.