Abuse Prevention

The Teknik Abuse Team makes sure to act quickly on all notifications it receives. All notifications received are evaluated by Teknik's Abuse Team, and processed with consideration of the sender's notification and Tekniks Terms of Service.

How to submit an Abuse Notification?

You can submit a notification to the Teknik Abuse Team by the way of email. Only reports sent by email in the correct format will be accepted.

Teknik Abuse Team: abuse@teknik.io

Requirements for Notifications

Please follow the requirements stated below when submitting a notification about content hosted and/or transmitted on Teknik. It is imperative that you follow these guidelines; non-compliance may result in a delayed or faulty processing of your notification.

  • Ensure that the notification is submitted in plain text.
  • Submit the notification in English language.
  • Send the abuse notification to the correct email address.
  • Do not send any notifications from a NO-REPLY email address.
  • Include your name, address, telephone number and email address.
  • The notification should reference a static URL that from where the reported content is located or from which the reported conduct occurred. This URL should resolve to the Teknik IP address.
  • Only include URLs or domains in your abuse notification for which you are seeking resolution.
  • Provide a description of the content or conduct that you wish to report and why this is infringing your rights or violating applicable law or the applicable Acceptable Use Policy.
  • For trademark infringement notifications: the registration details (including registration number) for the infringed trademark.
  • For copyright infringement, please include a description of the copyrighted work you claim has been infringed, including a copy of the copyrighted work or the web page address where the copyrighted work may be found.
  • For hacking, (D)Dos and malicious software: a description of the illegal activities, including date and timestamp, the IP address of servers that are subject of the illegal activities, the destination port, source port and log files.
  • Include one of the following key words in the body of your notification: [Child Abuse] [Copyright] [Trademark] [Phishing] [DDOS] [Spam] [Hack] [Malware] [Defamation] [Personal Data]
  • An electronic or physical signature of a person authorized to act on behalf of the owner of the copyright allegedly infringed.
  • A statement by you that you have a good faith belief that the disputed use of the material at issue is not authorized by the copyright owner, the agent of the copyright owner or the law.
  • A statement by you that the information in this notification is accurate and a statement, under penalty of perjury, that you are the copyright owner of the material allegedly infringed or authorized to act on the copyright owner's behalf.