Terms of Service and User Agreement
Effective Date: April 19, 2026
Last Updated: April 20, 2026
This Terms of Service agreement ("Agreement") constitutes a legally binding contract between the administration of Vault.Log ("Management," "we," "us," or "our") and any individual accessing or utilizing the services provided herein ("User," "you," or "your"). By creating an account or interacting with the Vault.Log platform, you acknowledge that you have read, understood, and agreed to be bound by the following terms and conditions.
1. Hosting and Third-Party Compliance
Vault.Log is hosted via the infrastructure provided by GoogieHost. This platform acknowledges and operates in full compliance with the Master Service Agreement and Acceptable Use Policy of GoogieHost. We reserve the right to modify, suspend, or terminate website operations immediately upon any request or directive issued by the webhost provider. Vault.Log exerts its best efforts to ensure that all scripts, database queries, and traffic patterns remain within the resource limits and legal frameworks established by the hosting provider. Users agree that Vault.Log shall not be held liable for service interruptions resulting from third-party provider actions.
2. Access Control and Invite Integrity
Access to Vault.Log is governed by a cryptographic Invite Key system. To maintain the security of this private community:
- Authorized Acquisition: Registration is only permitted via keys generated through the official system and provided directly by an authorized User or Administrator.
- Prohibited Extraction: Any attempt to "grab," "scrape," or "harvest" invite codes via automated scripts, API exploitation, or database intrusion is strictly prohibited.
- Coercion and Social Engineering: Forcing, threatening, or deceiving an authorized User into providing a generated code is a violation of this Agreement.
- Invalidation: Management reserves the right to manually or automatically invalidate any invite code suspected of being generated or obtained through unauthorized means. Accounts created using illicitly obtained codes will be terminated immediately.
3. Account Management and Cryptographic Privacy
Vault.Log prioritizes the security of user data through a "Privacy-by-Design" architecture.
- Credential Security: All user passwords and recovery keys are processed using industry-standard one-way cryptographic hashing algorithms. Management does not possess the technical means to decrypt, recover, or view your original password. If credentials are lost, they are irretrievable.
- Identification Data: Usernames are stored in a non-hashed, plaintext format. This is a technical necessity to ensure unique identification within the database.
- Right to Erasure: In accordance with modern data privacy principles, Users maintain the right to request the deletion of their accounts and associated personal data.
4. Content Standards and Conduct
Vault.Log is categorized as a private, non-commercial hobbyist blog and file-sharing interface intended for a closed circle of friends and invited associates.
- Restricted Access: This platform is not a public service. Access is granted at the sole discretion of the Management.
- Prohibited Content: Users are strictly prohibited from posting, linking to, or transmitting content that is: Illegal under local, national, or international law. Harmful, threatening, or inciting violence. Defamatory, harassing, or an infringement on the privacy of others.
5. Asset Storage and Upload Protocols
The platform utilizes Object Storage for asset management.
- File Restrictions: Uploading of pirated software, copyrighted material without authorization, Not-Safe-For-Work (NSFW) content, or malware is grounds for immediate account termination.
- Administrative Oversight: Management reserves the right to audit file metadata and remove any files that exceed size recommendations, violate content standards, or threaten the integrity of the storage.
- Storage Quotas: The platform operates under a collective storage ceiling of 5GB. Individual file uploads are recommended to remain under 10MB.
6. Termination and Suspension
Management reserves the unilateral right to suspend or permanently terminate access to Vault.Log for any User who fails to abide by the terms outlined in this Agreement.
7. Purpose and Limitation of Liability
Vault.Log is a "Hobbyist Project" provided on an "AS IS" and "AS AVAILABLE" basis.
- No Warranty: We make no warranties regarding uptime, reliability, or data integrity.
- Assumption of Risk: Users upload files and share information at their own risk. Management shall not be liable for any damages resulting from data loss or downtime.
8. Intellectual Property
The underlying source code, CSS framework, and UI design of Vault.Log remain the intellectual property of the site creator.
9. INTELLECTUAL PROPERTY AND EXTERNAL LINKS
While Management claims no ownership over the personal thoughts or blog posts of its users, the underlying source code, CSS framework (Tailwind/Internal), and UI design of Vault.Log remain the intellectual property of the site creator. Any external links posted by users are not endorsed by Management, and we are not responsible for the content of external websites.
10. Amendments to Terms
Management reserves the right to update these terms at any time. Continued use of the platform after changes constitutes acceptance.
11. SEVERABILITY
If any provision of this Agreement is found to be unenforceable or invalid under any applicable law, such unenforceability or invalidity shall not render these terms unenforceable or invalid as a whole, and such provisions shall be deleted without affecting the remaining provisions herein.
By logging into Vault.Log, you signify your agreement to Legal Terms.