Acceptable Use Policy

Last Updated: 24 March 2026

Important: By accessing or using any LegendTags system, platform, or resource, you agree to comply with this Acceptable Use Policy. Non-compliance may result in suspension of access or legal action.

1. Purpose

This policy defines the acceptable use of LegendTags systems, data, and technology resources to ensure security, integrity, and compliance with applicable laws and internal standards. It is intended to protect both LegendTags and its users from misuse, unauthorised access, and security threats.

2. Scope

This policy applies to all of the following individuals who access or use LegendTags systems and information:

This policy applies to all LegendTags systems, platforms, networks, devices, and data — whether accessed on-site or remotely.

3. Acceptable Use

All users of LegendTags systems and resources must:

4. Prohibited Activities

The following activities are strictly prohibited on all LegendTags systems and platforms:

5. Access Control

Access to LegendTags systems is managed on a role-based, need-to-know basis:

6. Data Protection

All personal and business data processed through LegendTags systems must be handled in accordance with applicable data protection laws, including the Protection of Personal Information Act (POPIA):

For more information on how LegendTags handles personal data, refer to our Privacy Policy.

7. Monitoring

LegendTags reserves the right to monitor the use of its systems, platforms, and data to:

By using LegendTags systems, users acknowledge and consent to such monitoring. Monitoring will be conducted in accordance with applicable privacy laws.

8. Reporting

Any suspected misuse, policy violation, security breach, or concern must be reported immediately to LegendTags management. Prompt reporting enables swift action to minimise risk and harm.

Report incidents to: Contact Us

All reports will be treated with confidentiality and investigated appropriately.

9. Enforcement

Violation of this Acceptable Use Policy may result in one or more of the following consequences, depending on the severity and nature of the breach:

This policy must be read in conjunction with the Terms of Service, Privacy Policy, and Consumer Protection Statement.