Acceptable Use Policy
TimeProof is built for legitimate proof, compliance, and record-integrity workflows. This page outlines the basic boundary lines.
Last updated: April 25, 2026
Permitted Uses
- Protecting original work, business records, research materials, software artifacts, and other legitimate files with proof of existence and integrity.
- Maintaining audit trails, compliance evidence, or operational records that benefit from independent timestamps.
- Using the service in ordinary business, professional, creative, academic, or personal recordkeeping workflows.
Prohibited Uses
- Illegal content or activity, including use that violates applicable law.
- Fraud, forgery, or misrepresentation, including attempts to misuse timestamps to support false claims of authorship, ownership, or priority.
- Harassment, threats, exploitation material, terrorism-related content, or similar abusive use.
- Abuse of the service itself, including spam, automation intended to overwhelm systems, or attempts to disrupt platform operations.
Important Clarifications
A timestamp proves that a specific file fingerprint existed at a specific time. It does not automatically grant copyright, patent rights, or ownership where the law requires additional evidence or registration. Because blockchain anchors are immutable, users should think carefully before anchoring sensitive material.
Reporting Issues
If you believe the service is being misused, contact support@timeprooflabs.com with relevant details.