Home

Terms of Use & Acceptable Use Policy

This Acceptable Use Policy (the “Policy”) describes rules for using Priority Pest Defense websites, forms, messaging, and related technology (collectively, the “Services”). These examples are illustrative, not exhaustive. We may update this Policy at any time by posting a revised version. By using the Services, you agree to the most current version.

Our Right to Act

We may suspend, restrict, or terminate access to the Services if, in our reasonable judgment, you (directly or indirectly) violate this Policy or assist others in doing so. We may also take interim measures while we investigate potential violations.

General Requirements

To help ensure messages reach the intended recipients and comply with law and industry standards, all communications you initiate through the Services (including SMS, MMS, webchat, voice, and similar channels) must follow this Policy. Key areas covered include: consent (opt-in), revocation of consent (opt-out), sender identification, acceptable use, prohibited content, anti-evasion, and enforcement.

Consent (Opt-In)

  • Obtain consent first. Before sending the first message to an individual, you must clearly obtain their agreement to receive the type of messages you plan to send.
  • Keep records. Retain proof of consent (e.g., signed form or timestamped online opt-in) as required by law and best practices, including after an individual opts out.
  • Timely messaging. If you don’t message within a reasonable time after consent, reconfirm consent in your first message.
  • Consent is specific and not transferable. You may not buy, sell, or exchange consent, or treat it as blanket permission for other brands or purposes.

Alternative Ways Consent May Be Provided

  • Individual-initiated contact. If someone messages you first (e.g., asking hours), you may respond within that conversation’s scope. Do not send unrelated messages without new consent.
  • Informational messages tied to an action. If there’s a prior relationship, the individual provided their number, took an action (e.g., appointment, order, alert), and hasn’t opted out, you may send informational, non-marketing messages like confirmations, reminders, OTP codes, or scheduling updates.

Ongoing Messages

For recurring messaging, clearly remind recipients how to unsubscribe and respect any stated preferences for frequency. Periodically reconfirm consent as required by regulations and best practices.

Identify Yourself

Each initial message must clearly identify Priority Pest Defense (the party that obtained opt-in) as the sender, except in follow-ups within an ongoing conversation.

Opt-Out

  • Include opt-out instructions such as “Reply STOP to unsubscribe” in your initial message (standard keywords include STOP, STOPALL, UNSUBSCRIBE, QUIT).
  • Honor opt-outs immediately. You may send one final confirmation of the opt-out; no further messages are allowed unless new consent is obtained.

Prohibited Content

You may not use the Services to transmit content that is illegal, harmful, fraudulent, infringing, offensive, or otherwise objectionable, including (without limitation):

  • Unsolicited advertising or spam without proper consent.
  • Illegal or harmful activity; fraudulent goods or schemes; “get-rich-quick” or similar programs; high-risk financial services; third-party lead generation; debt collection or forgiveness services; illegal or regulated substances or prescription drugs that cannot be sold OTC; gambling.
  • “SHAFT” categories: Sex, Hate, Alcohol, Firearms, Tobacco (including vaping).
  • Phishing, malware, or any content intended to damage or compromise systems.
  • Content that infringes intellectual property or privacy rights.

Anti-Evasion

  • Do not attempt to evade unwanted-messaging detection (e.g., misspellings to bypass filters, non-standard opt-out phrases).
  • No “snowshoeing” (spreading similar or identical messages across many numbers to evade detection).
  • Avoid public URL shorteners (e.g., bit.ly). If needed, use your own dedicated short domain.

Technical Restrictions

  • Do not reverse engineer, disassemble, or attempt to access non-public code or APIs.
  • Do not bypass security controls or rate limits.
  • Do not remove or obscure proprietary notices in the Services.

Monitoring & Enforcement

We may monitor content sent through the Services and investigate suspected violations. We may remove content, disable access, or take other action. We may report unlawful activity to authorities and cooperate with investigations, which can include sharing appropriate customer information.

Reporting Violations

If you believe this Policy has been violated, please contact us so we can review and, if appropriate, take action.


Back to Home