Privacy Policy



These Terms of Service, which govern how you use our social networking platform BITANDEX, which is powered by cryptocurrencies, are provided to you by BitandEx. Your use of BITANDEX is governed by these Terms, which will be applied to the fullest extent possible.

You consented to accept all of the terms specified above as well as our set community standards by using BITANDEX. If you disagree with any of the Terms and Community Standards, you are not permitted to use BITANDEX.

It is prohibited for anyone under the age of 18 to use Bitandex.


You are expressly prohibited from doing all of the following:

The following are prohibited from using Bitandex: 1. Publishing any content from Bitandex in any other media; 2. Selling, subleasing, and/or otherwise commercializing any content from Bitandex; 3. Publicly performing and/or showing any content from Bitandex; 4. Using Bitandex in any way that is or may be harmful to Bitandex; 5. Using Bitandex in any way that affects user access to Bitandex; 6. Using Bitandex in any way that may violate any laws and regulations

  1. Violation of the terms of the user agreement or using the BITANDEX mission system for personal gain.

Manipulation of several accounts on BITANDEX, spamming the platform to earn rewards from BITANDEX's missions system, referring fictitious or inactive accounts to BITANDEX, farming XTM from within groups to fulfill Follow type tasks are all examples of actions that fall under this category.

You are not permitted to access all sections of BITANDEX, and BitandEx may limit your access to any areas of BITANDEX at any time, for any reason, and at its sole discretion. Any private information you use for BITANDEX, such as passwords, is completely confidential, and you are required to uphold that confidentiality.

Input from You

"Your Content" refers to any audio, video, text, photos, or other materials you choose to show on BITANDEX in accordance with the terms and conditions. By displaying Your Content, you authorize BitandEx to use, reproduce, adapt, publish, translate, and distribute it in any and all media. This license is non-exclusive, worldwide, irrevocable, and sublicensable.

Your Content must be original to you and must not have been created in violation of any laws or the rights of any third parties. BitandEx reserves the right to at any time and without prior notice delete any of Your Content from BITANDEX.

There are none.

BitandEx makes no representations or warranties of any kind regarding BITANDEX or the materials found there; it is given "as is," with all flaws. Furthermore, nothing on BITANDEX should be construed as advice to you.

Restrictions on Liability

Regardless of whether such responsibility is based on a contract, neither BitandEx nor any of its officers, directors, or employees shall in any way be liable for anything resulting from or connected in any way to your use of BITANDEX.

The use of BITANDEX by you shall not give rise to any indirect, consequential, or special liability on the part of BitandEx, including its officers, directors, and employees.


By signing this agreement, you fully hold BitandEx harmless from and against any and all liabilities, charges, claims, causes of action, damages, and expenditures resulting from any violation of these Terms on your part.


If any term in these terms is determined to be unlawful under any relevant legislation, that term will be eliminated without affecting the remaining terms.

Different Terms

These Terms may be updated whenever BitandEx sees fit, including from time to time. You agree to regularly review these Terms as a condition of using BITANDEX.


Without giving prior notice, BitandEx is free to take any required actions to assign, transfer, or subcontract its rights and/or obligations under these Terms. You may not, however, delegate, transfer, or otherwise deal with any of your rights or responsibilities under these Terms in any other manner.

Complete Agreement

These Terms supersede all prior agreements and understandings with respect to your use of BITANDEX and represent the entire understanding between you and BitandEx in that regard.

Law that Will Apply & Jurisdiction

The laws of Malaysia will apply to the interpretation and application of these Terms. Any dispute arising under or related to this Agreement shall be exclusively brought before Malaysian courts for resolution.


Users of BITANDEX who are worried about how their personal information is being used online can benefit from this privacy policy. The Personal Data Protection Act (PDPA) of Malaysia governs the handling of personal data in connection with business transactions. You should carefully read our privacy statement to understand how we gather, utilize, safeguard, and otherwise handle your personal information in line with BITANDEX.

What private data do we gather from users who access our platform, website, or app?

As needed, we may ask for your name, email address, or other information from you when you register on our site in order to personalize your experience.

You may be required to complete your profile information in order to access some BITANDEX capabilities, whereupon relevant and necessary information may be retrieved from your profile or perhaps used to verify your identity.

How and when do we gather data?

When you register on our site or enter information on our site, we receive information from you.

What do we do with your data?

We may make the following uses of the data we learn about you from when you register, conduct business with us, subscribe to our newsletter, respond to a survey or marketing communication, browse our website, or use particular other site features:

  1. To enhance your experience on BITANDEX by enabling us to deliver the information and make connections with the people you are most interested in.
  2. To enhance our website so that you have a better user experience.
  3. To send recurrent emails about your BITANDEX's most recent updates or other pertinent goods and services.

How are your details safeguarded?

We do not employ PCI-compliant scanning or screening for vulnerabilities. We never request private keys or payment card information; we simply offer articles and information.

Your personal information is kept behind guarded networks and is only accessible by a small group of people who are obligated to maintain the confidentiality of the information and who have special access permissions to such systems. Additionally, using Secure Socket Layer (SSL) technology, we safely encrypt all of the sensitive and credit information you provided. To protect the security of your personal information, we take a number of precautions when a user inputs, submits, or accesses their information on our website.

Do we employ "Cookies"?

Yes. If you allow it, a website or its service provider may transfer a little file known as a cookie to your computer's hard drive. Cookies help the website's or service provider's systems identify your browser and collect and remember specific information.

As an illustration, we utilize cookies to better understand your preferences based on past or present site usage, allowing us to provide you better services. In order to provide better site experiences and tools in the future, we also employ cookies to aid in the collection of aggregate data on site traffic and user activity.

Cookies are used by us to: 1. Analyze and save user preferences for subsequent visits.

  1. Gather statistics on site interactions and traffic in order to provide users with future tools and experiences that are better. We might also make use of reliable third-party services to monitor this data on our behalf.

You have the option to turn off all cookies or have your computer notify you each time one is sent. Through your browser's options, you can accomplish this. Since each browser has a unique user interface, consult the Help menu in your browser to find out how to alter cookies in the best way possible.

When browser cookies are disabled:

Some of the features that improve and enhance your site experience may not work properly if you disable cookies.

unauthorized disclosure

We do not trade, sell, or otherwise transmit your personal information to third parties unless we first notify users. This does not apply to our website hosting partners or other third parties who help us run our business, operate our website, or provide services to our users, as long as those parties agree to keep this information private. We may also disclose information where doing so is necessary to comply with the law, to enforce the terms and conditions of our website, or to otherwise preserve the rights, property, or safety of us or others.

However, visitor data that cannot be used to identify an individual may still be shared with third parties for marketing, advertising, or other purposes.

external links

On occasion, we might integrate or provide third-party goods or services on our website at our discretion. These external websites each have their own privacy rules. As a result, we are not accountable or responsible for the actions or content of these connected websites. Nevertheless, we work hard to maintain the quality of our website and appreciate any criticism of these external sites.

Act Protecting Personal Information (PDPA)

The processing of personal data pertaining to business transactions is governed by the Personal Data Protection Act (PDPA), which was issued in 2010. The PDPA entered into force in Malaysia with the intention of safeguarding individual consumers' personal data when it comes to business dealings. From the time that personal data is collected, utilized, or kept, until it is destroyed, BITANDEX must manage the personal data life cycle management process in accordance with the Act.

We consent to the following in accordance with the PDPA:

Our website welcomes anonymous users.

After logging in to our website, you can quickly view our Privacy Policy by clicking the word "Terms" in the footer (bottom right corner) of the following pages: Home, Company Profile, Clan, User Profile, etc.

Any updates to our privacy statement will be posted on our privacy statement page.

By login into your account, you can modify your personal information.

How do Do Not Track signals work on our website?

When a Do Not Track (DNT) browser feature is in place, we respect the signals and do not track, place cookies, or employ advertising. However, this can have an impact on how you utilize BITANDEX.

Does our website permit behavioral tracking by outside parties?

It's also vital to know that we prohibit behavioral tracking by third parties.



Criminal Behavior and Violence Violence and Incitement

Policy Justification

Our goal is to stop any potential offline harm that might result from BITANDEX content. We eliminate language that incites or aids severe violence, even though we recognize that people frequently express scorn or disagreement by threatening or asking for violence in non-serious ways. When we believe there is a real possibility of physical danger or immediate risks to public safety, we take down content, disable accounts, and cooperate with law officials. We also make an effort to distinguish between casual utterances and anything that poses a genuine risk to the public or individual safety by taking language and context into account. We may also take into account additional facts, such as a person's public profile and the dangers to their physical safety, when deciding whether a threat is genuine. When we perceive aspirational or constrained threats against terrorists and other violent actors (such as "Terrorists deserve to be killed"), we often don't take them seriously in the absence of concrete proof to the contrary.

Actions Prohibited (X)

Threats against any target(s) that could result in their death (or other severe kinds of violence), where threat is defined as any of the following:

Statements advocating for high-severity violence; Aspirational or conditional statements to commit high-severity violence; Statements of intent to commit high-severity violence; Calls for high-severity violence including content where no target is specified but a symbol represents the target and/or includes a visual of an armament to represent violence

Content that calls for the use of a hitman, mercenary, or assassin against a target or solicits others to kill them (for example, hitmen, mercenaries, or assassins).

admissions, declarations of support, requests for action, or remarks that are aspire- or conditionally-motivated to abduct a target.

Threats against private individuals, small public figures, high risk individuals, or high risk groups that could result in significant injury (mid-severity violence), where threat is defined as any of the following:

The following are examples of statements that fall under this category: "statements of intent to commit violence," "statements advocating violence," "calls for mid-severity violence," "aspirational or conditional statements to commit violence," "content about other target(s) besides private individuals, minor public figures, high risk persons, or high-risk groups," and any credible

  • Intentional or conditional statements to use violence; calls for violence to be used; remarks endorsing violence; or statements advocating the use of violence

Threats that result in actual bodily harm (or other types of less severe violence) made against private people (self-reporting is necessary) or small public figures, where threat is defined as any of the following:

  • Private persons (name and/or face match is required) or insignificant public figures, such as:
  • Intentional, activist, pro-action, aspirational, or conditional declarations to engage in low-intensity violence

Threats of violence that have been added to images of private people or minor public figures, either by text or visual manipulation (such as adding a bulls-eye, dart, or pistol on a person's skull, for example).

any material produced specifically with the intention of identifying a person as a member of a known at-risk group.

if there is proof of a desire to significantly hurt or kill people, instructions on how to create or use weapons through:

As part of the instruction, images or movies that depict or replicate the desired outcome (severe injury or death) should be used.

  • Unless the aforementioned material is distributed for news reporting, commercial video games, military training, or recreational self-defense (posted by company profiles or with news logo)

Providing guidelines for the creation or use of explosives:

  • Unless there is a strong context indicating that the content is intended for a non-violent purpose (such as when it is a component of commercial video games, has a clear scientific or instructional purpose, involves pyrotechnics, or is especially intended for fishing),

Anything that advocates for high or medium levels of violence because of voting, voter registration, or the results of an election, or that makes declarations of purpose or calls to action.

Misinformation that raises the possibility of impending violence or bodily damage.

Intentional declarations, calls to action, aspirational declarations, or statements with conditions calling for the carrying of firearms into places of worship, schools, or polling sites, among others (or encouraging others to do the same).


Persons and Organizations at Risk

Policy Justification

We do not let any organizations or people that declare a violent mission or are involved in violence to have a presence on BITANDEX in an effort to prevent and disrupt real-world harm.

This comprises businesses or people engaged in the following:

  • Terrorist action; • Group hatred; • Multiple murders or attempted multiple murders;
  • Organized crime or violence; • Human trafficking

We also delete material that shows support or admiration for organizations, persons, or leaders engaged in these acts.

Activities Banned (X)

We forbid the following individuals (alive or dead) or organizations from continuing to have a presence on our platform (for instance, by having an account, company profile, or clan):

Terrorist groups and individuals include anyone who engages in, advocates for, or provides significant support for intentional and planned acts of violence, causes or attempts to cause death, serious injury, or serious harm to civilians, or any other person not directly engaged in hostilities in an armed conflict, and/or significant damage to property linked to such harm.

  • With the purpose of intimidating, coercing, or influencing a civilian population, a government, or an international body
  • To fulfill a political, religious, or ideological objective.

Hate groups, their prominent leaders, and members:

A hate organization is described as any group of three or more people that is organized under a name, sign, or symbol and that espouses beliefs, makes public declarations, or engages in physical acts that target people based on their racial, religious, national, or ethnic background, gender, sex, orientation, or serious medical condition.

Mass-murderers and serial killers (including attempts)

If three or more people are killed in a single incident, it is considered a mass murder. If more than one person is targeted with a weapon or vehicle, it is considered an attempted mass murder. If a person kills two or more people over the course of multiple incidents or locations, it is considered a multiple murderer.

the leaders of human trafficking organizations

  • Organizations engaged in human trafficking may be accountable for any of the following:
  • Other people being used as prostitutes, forced or bonded labor, slavery, or organ harvesting
  • Obtaining a kid or an adult against their will by recruiting, moving, transferring, holding, supplying, harboring, or receiving them

Criminal groups, their leaders, and well-known participants

An organization that has engaged in or threatens to engage in criminal activity, such as (but not limited to) homicide, drug trafficking, arms trafficking, identity theft, money laundering, extortion or trafficking in persons, assault, kidnapping, or sexual exploitation, is referred to as a criminal organization. (covered in section 7 and section 8)

We prohibit the posting of images of any of the aforementioned groups or people on our platform without neutral or condemnatory commentary accompanying the images.

Content that honors any of the aforementioned entities, people, or actions is not permitted.

We do not permit the coordination of support for any of the aforementioned groups, people, or actions.

Content that celebrates, encourages, or symbolizes incidents that BITANDEX classifies as terrorist attacks, hate crimes, or mass shootings is not permitted.

Policy Justification for Coordinating Harm and Publicizing Crime

We forbid individuals from aiding, coordinating, advocating, or confessing to specific unlawful or harmful behaviors intended to harm people, businesses, property, or animals in an effort to prevent and disrupt offline harm and copycat conduct. As long as they don't promote or coordinate violence, we enable people to argue against the legitimacy of criminal and harmful behavior and to call attention to any such action they may have personally witnessed or experienced.

Content that fits into the following categories is prohibited (X) Actions

harm to individuals

Statements of purpose, exhortations to action, or demands for violence against others that portray, acknowledge, or support the following actions taken by you or your associates:

  • Physical assaults on anyone, including domestic assaults, unless they are committed in the name of atonement or self- or other-defense.

Encouragement of participation in a risky viral challenge; Swatting

cruelty to animals

Statements of purpose, exhortations, or support for cruelty to animals that show, acknowledge, or encourage:

  • Physical attacks on animals carried out by you or your friends, excluding those related to hunting, fishing, religious sacrifice, food preparation or processing, pest control, vermin control, self-defense, or atonement
  • Animal battles that are staged, including those where a third party is involved.

damage to property

Statements of purpose, exhortations to action, or demands for causing harm to property that represent, acknowledge, or support the following actions taken by you or your associates:

  • Vandalism • Hacking with the intention of gaining illegal access to data systems, hijacking a domain, corrupting or disrupting cyber systems, or demanding ransoms • Theft by you or your associates as well as flattering claims of theft when done by a third party

Census fraud or voter fraud

  • Proposals to purchase or sell votes for money or gifts
  •   Statements that encourage illegal participation in a voting or census process, give directions on how to do so, or otherwise express intent to do so

Census and/or Voter Interference

  • Misrepresentation of who can vote, requirements for voting, whether a vote will be counted, and what information and/or documents must be submitted in order to vote. • Misrepresentation of the dates, locations, hours, and procedures for voting, voter registration, or census participation.   Misrepresentation of a candidate's candidacy status, the eligibility of participants in the census, and the requirements for submitting documents or information   calls for concerted interference that would prevent someone from taking part in the censuses
  • Content that implies that participating in a census or election will have legal repercussions (such as arrest, deportation, or imprisonment); • Content that misrepresents government involvement in the census, such as claims that a person's census information will be shared with another government agency; • Other misrepresentations about participating in a census or election that may be subject to false news standards

We have a label for the following content to let people know it can be sensitive:

  • Pictures of high-risk viral challenges that are shared with a caption that criticizes or draws attention to the dangers involved

Reasons for the Regulated Goods Policy

We forbid attempts by people, producers, and merchants to buy, sell, or trade non-medical medicines, prescription drugs, and marijuana in order to promote safety and compliance with common legal constraints. Additionally, we forbid private persons from buying, selling, gifting, exchanging, or transferring firearms on BITANDEX, including firearm components or ammunition. Some of these things are not regulated everywhere, but because our community is borderless, we aim to enforce our rules as consistently as we can. As long as the firearm shops and online sellers abide by all relevant rules and regulations, they may advertise goods that are for sale outside of our services. We permit discussion of the retail or online sales of firearms and firearm parts as well as the promotion of changes to firearm laws.

Activities Banned (X)

Content about non-prescription drugs that: 

  • Plans or promotes the sale of non-prescription medications by others
  • Promotes, encourages, coordinates, or offers instructions for the use of non-medical drugs by the poster of the content or their companions. 
  • Depicts, admits to, attempts to purchase, or promotes sales of non-medical drugs.
  • If not posted in a context of recovery, admits in writing or verbally to using non-medical drugs for personal purposes.

content that shows people trying to buy or selling narcotics like marijuana. This includes anything that: 

  • Mentions or shows marijuana or other drugs; or
  • Attempts at trading or selling, which includes any of the following:
  • Directly asking the audience to purchase the goods by stating that it is available for purchase, exchange, or delivery
  • Indicate the cost
  • Encouraging contact about the product by requesting contact up front or by offering any available contact information.
  • Trying to sell the item, which is indicated by:

Declaring an interest in purchasing the item or asking if someone is willing to sell or swap it

  • Both individual pieces of content and Pages and Groups with a focus on the sale of marijuana or prescription medications are affected by this.

Content that attempts to offer, sell, gift, trade, or transfer weapons, weapon components, ammunition, or explosives between private parties, unless it is published by a Page that is affiliated with a real physical location, a trustworthy company, a reputable brand, or a legal governmental body. (e.g. police department, fire department). This includes material that: 

  • Mentions or shows firearms, firearm parts, ammunition, explosives, or files for 3D printing any firearm or its parts*; and
  • Attempts to trade or sell, which include:

Clearly stating that the item is for sale or trade, asking the audience to buy, listing the price, or stating that the item is free are all acceptable methods of communication.

  • Encouraging contact with regard to the product by either including any available contact information or explicitly requesting to be contacted.
  • Attempts to solicit the sale of the object, which are defined as: 
  • Declaring an interest in purchasing the item or 
  • Inquiring as to whether anyone else is offering the item for sale or trade.
  •   * No one may distribute 3D gun printing files or instructions for utilizing CNC milling machines or 3D printers to make firearms, including hyperlinks to websites where such files or instructions are made available. Otherwise, information that may promote these things solely for sale off of our services and as long as such sellers comply with all applicable rules and regulations may be posted by a profile for a real brick-and-mortar store, legitimate website, or brand.

Content that shows the purchasing or selling of human blood, with trade being understood to mean:

Mentioning or showing human organs and/or blood, indicating that they are offered for purchase or sale, or listing a price or indicating a readiness to discuss a price are all acceptable.

Content that promotes interaction to make the exchange of human blood easier.

content that tries to sell live animals to individual consumers.

material that promotes or organizes the poaching, buying, selling, or trade/trading of endangered species and their parts.

content that shows you or your friends hunting or selling endangered species or their parts.

Content relating to threatened species:

  • Propagating or endorsing the killing of endangered species or the trade in their components.
  • Shows instances of the author of the article or their accomplices killing or selling endangered species' parts.
  • Material that tries to acquire, sell, or give away endangered creatures or their parts.

content that tries to offer, sell, gift, exchange, or transfer tobacco or alcohol items between private parties. This covers anything that: 

  • Mentions or shows alcohol or tobacco;
  • Makes an attempt to sell or trade anything, by which we mean: 
  • Clearly states that the item is for sale or trade; 
  • Begs the audience to purchase; 
  • Lists a price; or 
  • Indicates that the item is free;
  • And was not published by a profile claiming to be an actual physical location, reputable website, or well-known company.
  • Articles marketing weight loss goods with a magical promise and an advertising offer

The following content will be restricted:

Contents published by or supporting a physical location, reputable website, or brand that organizes or supports the transfer of weapons, weapon components, ammunition, explosives, alcoholic beverages, or tobacco products away from the services of BITANDEX. Content that: 

  • Explicitly mentions the product is for sale or transfer and 
  • Asks the audience to buy the product, or 
  • Lists the price or notes that the product is free, or 
  • Encourages contact about the product by either explicitly asking to be contacted or including any type of contact information

Alcohol or tobacco is mentioned or shown, and it is explicitly stated that the item is for sale or trade, or that the audience should purchase, or

  • Indicates if a product is free or lists the price.
  • Promotes communication about the goods by either explicitly requesting contact or by including any available contact details.
  • Material that advertises or encourages the use of weight loss products
  • Mentions or portrays a weight loss supplement or product, and 
  • Promotes, supports, coordinates, or offers usage instructions; or 
  • Clearly states that the product is being donated, sold, traded, or delivered; or
  • Requests a purchase from the audience; lists the cost; or offers the item for free.
  • Encourages the use of or shows the selling of specific cosmetic operations, as those involving bodily augmentation:

If the content: 

  • Mentions or depicts a cosmetic procedure, and 
  • Promotes, encourages, coordinates, or gives instructions for the procedure, or 
  • Explicitly mentions that the procedure is for sale, or 
  • Requests that the audience buy the procedure, or 
  • Lists the procedure's cost, or 
  • Offers the procedure for free Content that shows an attempt to buy or sell knives, including content that: 
  • Mentions or depicts a knife or other bladed weapon


Rationale for the Fraud and Deception Policy

We remove content intended to intentionally mislead others in order to obtain an unfair advantage or deprive someone of money, property, or legal rights in an effort to prevent and disrupt harmful or fraudulent activities. However, we provide people the opportunity to use our platform to reject these actions, spread awareness about them, and educate others.

Actions Not Allowed (X):

Content that participates in, encourages, facilitates, promotes, or admits the following behaviors:

Offering, soliciting, and trading of: 

  • Goods/Property obtained through the use of stolen financial information; 
  • Future exam questions or answer sheets where the answers are not intended for public consumption; 
  • Educational and professional credentials
  • Identification for services with paid subscriptions

The following are examples of betting manipulation: match fixing; fake user reviews; fake or manipulated documents, such as coupons or prescriptions; fake or counterfeit currency; recruitment of workers for fraudulent activities, such as Social Security Number (SSN) scams.

  • Additional deceptive tactics used to deprive individuals of their money or property include: 
  • Confidence tricks, such as romance or military impersonation frauds; 
  • Ponzi and Pyramid schemes; and 
  • "Get Rich Quick" schemes.

Establishing fictitious companies or entities; Investment schemes offering high rates of return; Bribery; Embezzlement; Money laundering (hiding the source of money obtained illegally); False fundraising campaigns for charities; Debt Relief or Credit Repair Scam;


Reasons for the Suicide and Self-Injury Policy

We remove information that promotes suicide or self-harm from BITANDEX in an effort to foster a safe environment. This includes some violent visuals and real-time descriptions that experts warn us may encourage others to participate in similar behavior. The purposeful and direct harming of the body, such as self-mutilation and eating disorders, is referred to as self-injury. We allow people to talk about suicide and self-injury because we want BITANDEX to be a place where people can share their stories, spread awareness of these topics, and get support from one another.

We also delete any information that specifically names and disparages self-injury or suicide victims or survivors in a serious, humorous, or rhetorical manner.

Content that supports suicide, self-harm, coordination, or provides advice in any of these areas is prohibited (X).


Content that features graphic images of self-harm

It is against our regulations to post content showing a person who attempted suicide or died by suicide, unless in rare newsworthy circumstances.

Content that, when combined with terms related to eating disorders, emphasizes the depiction of ribs, collar bones, thigh gaps, hips, concave stomachs, or protruding scapula spine.

When shared with phrases related to eating disorders, content that offers recommendations for rapid and unhealthy weight reduction.

The following content is restricted:

  • Pictures or videos of someone's suicide death that are deemed newsworthy
  • Images or recordings showing someone who committed assisted suicide or euthanasia in a hospital setting

Policy Justification for Child Nudity and Child Sexual Exploitation

Content that sexually abuses or endangers children is not permitted. We are aware that sometimes parents share naughty pictures of their kids with the best of intentions, but we usually take the pictures down to prevent misuse by others and to prevent them from being used or misappropriated by others.

Actions Disallowed (X):

Content that promotes or shows children being sexually exploited, including but not limited to: 

  • Engaging in any sexual behavior with minors
  • Use of our products and website features for the purpose of sexualizing children includes: Adults soliciting minors; children soliciting adults; Minors soliciting minors;
  • Content that initiates unwanted contact with minors (for instance, private messages between minors and stranger adults) or facilitates inappropriate interactions with children. Soliciting, displaying, sharing, or viewing images of nude, sexualized, or sexual activity with minors.
  • Setting up actual sexual encounters with minors or directly acquiring sexual content from them
  • Nudity in front of children

Content that shows: 

  • Any sexual conduct involving children in photos, films, real-world art, digital content, or text
  • Minors with sexual elements, such as (but not limited to): Minors with a sexual fetish setting 
  • Restraints, a genital-focused focus, the presence of an aroused adult, the presence of sex toys, and sexualized attire
  • Stripping 
  • Staged setting (on a bed, for instance) or expertly shot (quality/focus/angles)
  • Kissing a child or an adult with an open mouth
  • Content that depicts children in a sexualized setting is prohibited. This includes images, films, real-world artwork, digital content, and verbal representations.
  • Nudity is defined as: Visible genitalia (even when hidden or obscured by transparent clothing); Visible anus and/or fully nude close-up of buttocks; Uncovered female nipples for children older than toddler-age; No clothing present from neck to knee for children older than toddler-age.
  • Images of minors in nude made digitally, unless the photograph is for medical or educational purposes Adult Sexual Exploitation

Policy Justification

We are aware that BITANDEX may be utilized as a forum for the discussion and public awareness of sexual abuse and exploitation. This, in our opinion, is a crucial component of fostering community and shared understanding. We take down material that represents, suggests, or encourages sexual violence, sexual assault, or sexual exploitation in an effort to foster this conversation while fostering a secure environment. At the same time, we leave room for victims to talk about their experiences. We take down material that promotes, models, or organizes sexual activity with unconsenting individuals or commercial sexual services like escorting or prostitution. We do this to prevent facilitating transactions that might entail forced sex, trafficking, or coercion.

We also take down pictures showing instances of sexual assault and personal pictures uploaded without the subjects' consent in order to safeguard the victims and survivors.

Actions Not Allowed (X):

Any content that involves non-consensual touching, crushing, necrophilia or bestiality, or forced stripping, including: 

  • Depictions (including real photos/videos); 
  • Advocacy (including aspirational and conditional statements); 
  • Statements of intent; 
  • Calls for action; 
  • Threatening, soliciting, or stating an intention to share imagery; 
  • Admitting participation; or 
  • Mocking victims of any of the above Co
  • Threatening to publish someone's naked or partially-naked photos or films in order to get money, favors, or images from them.
  • Sharing, threatening, initiating an intent to share, offering or requesting images that fall under the categories of "Revenge Porn" or "Non-Consensual Intimate Images" that meet all three of the criteria below:
  • Person in the image is (near) nude, doing sexual activity, or striking a sexual stance; the image is non-commercial or was taken in a private context.
  • The context's vindictive nature indicates a lack of consent to share the image. (for example, caption, comments, or page title)
  • Independent sources, such as entertainment media and police enforcement records (for example, leak of images confirmed by media)
  • A clear correspondence between the subject of the photo and the person who notified us of the content.
  • Secretly captured non-commercial imagery of a real person's commonly sexualized bodily parts (breasts, groin, buttocks, or thighs), or of a real person engaging in sexual behavior. 
  • The person who reported the content to us shares the same name as the person portrayed in the photograph. Commonly referred to as "creepshots" or "upskirt," this imagery consists of images that make fun of, sexualize, or otherwise expose the person being shown.
  • Making the following threats or declaring a desire to exchange sexually explicit chats in private:

When there is a context that is hostile or threatening, it indicates that there is a lack of consent.

  • A clear correspondence between the subject of the photo and the person who notified us of the content.
  • The individual who notified us of the content has the same name as the subject shown in the picture.
  • Trying to organize prostitution or adult commercial sexual services, such as by soliciting, providing, or requesting rates for escort services, paid sexual fetish services, or paid services for dominance.


Rationale for the Bullying and Harassment Policy

Bullying and harassment take occur everywhere and can take many different forms, including making threats, disclosing personally identifiable information, communicating obtrusive threats, and initiating unwelcome contact. Because it hinders users from feeling protected and appreciated on BITANDEX, we do not accept this kind of behavior.

Context and motivation are important, and if it is obvious that a post was posted with the intention of denouncing or drawing attention to bullying and harassment, we let others to share and reshare it. Self-reporting is necessary in some situations because it enables us to determine whether the individual being targeted is being bullied or harassed.

Actions Not Allowed (X):

Contacting someone repeatedly in a way that is: unwanted, sexually aggressive, or directed towards numerous people without any previous solicitation

  • Attacking someone based on the fact that they have experienced sexual assault, sexual exploitation, or domestic abuse
  • Calling for a specific person, or a group of persons, to commit suicide or self-harm
  • Posting content about violent tragedies or victims of violent tragedies that includes claims that a violent tragedy did not occur 
  • Posting content about victims or survivors of violent tragedies by name or by image, with claims that they are not victims or survivors of violent tragedies
  • Threatening to reveal a person's private phone number, home address, or email address; 
  • Creating or posting content that is dedicated to attacking a person(s), for example, by 
  • Calling for death or serious disease or disability; 
  • Making statements of intent to advocate for engaging in sexual activity;
  • Claims about what happened; 
  • Acting/pretending to be a victim of an event; 
  • Other paid or employed to deceive people about their role in the event;
  • Sending words that, when directed at a specific person or group of people in the thread, include any of the following: 
  • Targeted cursing 
  • Calls for bodily injury, death, or other serious conditions

Target another private person or public figure with: 

  • Calls for death or significant illness or disability 
  • The use of disparaging phrases with the feminine gender 
  • Claims about sexual activity or STDs
  • Accounts, businesses, or clans formed specifically to launch attacks:

Targeted swearing, graphic physical descriptions, assertions about one's religion or blasphemy, and expressions of scorn or distaste

Target public personalities by exposing them on purpose to: 

  • For adults
  • Statements of intending to participate in sexual behavior or pushing for others to engage in sexual activity; 
  • Calls for death, significant illness, or incapacity; 
  • Claims regarding STIs
  • Content that celebrates, mocks, or uses pejorative female-gendered curse words to refer to them in their death

Target private individuals or uninvited minor public figures by: 

  • Comparing them to insects or animals that are viewed as as less intelligent or physically superior in their culture, or to inanimate objects (such as "cow," "monkey," or "potato");
  • Content that has been altered to emphasize, circle, or otherwise call attention negatively to certain physical traits (nose, ear, etc.)

Content that ranks people based on their physical appearance or personality. Content that shows people while they are menstruating, urinating, vomiting, or defecating or right after, where the context further degrades the person or contains an expression of disgust. Physical bullying where the context further degrades the person.

  • In addition to the aforementioned, clans or profile attacks include:
  • Criticisms of a person's abilities or character
  • Bullying that is self-referential; only occurs when the target is more than one private person.
  • Materials that glorify, celebrate, or make fun of their demise

Target any private juveniles, private adults (who must self-report), or involuntary minor public figures with:

  • Specific swearing
  • Statements on a romantic relationship, sexual orientation, or gender identity
  • Planning, advocating, or encouraging exclusion Negative character or skill assertions, excluding those made in connection with accusations of adult criminal behavior
  • Expressions of disdain or disgust, unless they relate to accusations of adult criminal behavior

Target adolescent private persons with:

  • Videos depicting physical bullying or violence against minors in a fight context shared in a non-condemning context; 
  • Allegations of criminal or unlawful activity

Target private individuals with the following (who must self-report):

  • Self-referential bullying; unwanted manipulated imagery; comparisons to other real or imagined people based solely on physical appearance; assertions of religious identity or blasphemy, with the exception of at-risk nations where the Violence and Incitement policy should be used; and comparisons to insects or animals that are not viewed as inferior by culture (e.g., "tiger," "lion")
  • Attacks using pejorative language relating to a lack of sexual activity; neutral or favorable physical descriptors; non-negative character or ability claims; any bullying or harassment violation, when conveyed in an endearing setting;


Reasons for the Human Exploitation Policy

We remove anything that promotes or organizes the exploitation of people, including human trafficking, in an effort to disrupt it and stop harm. We describe human trafficking as the practice of denying someone their freedom in order to make money. Humans are being exploited when they are made to participate against their will in commercial sex, labor, or other activities. It makes use of trickery, compulsion, and force and degrades people by robbing them of their freedom while gaining material or financial gain for others.

Global and multifaceted, human trafficking can touch anyone, regardless of age, socioeconomic status, race, gender, or region. It can take many different forms, and it can occur at different phases of development in any particular setting. Victims of this abuse are unable to consent because of its coercive character.

Although we must be careful to distinguish between the two, smuggling and human trafficking can have similarities and be tied to one another. The procurement or facilitation of illegal entry into a state across international borders is described by the United Nations as human smuggling. It may nonetheless lead to the exploitation of helpless people who are attempting to leave their place of origin, frequently in search of a better life, without the need for compulsion or force. Human trafficking is a criminal against an individual that relies on exploitation, whereas human smuggling is a crime against a nation that relies on transportation.

Actions Not Allowed (X):

Content or actions that may encourage the exploitation of humans include any of the following:

  • Forced marriages; 
  • Sex trafficking involving both juveniles and adults; 
  • The purchase of children for illicit adoption; 
  • Orphanage trafficking and orphanage voluntourism;
  • Employment exploitation (incl. bonded labor)
  • Forced criminal activity, non-regenerative organ trafficking, and domestic servitude (e.g. forced begging, forced drug trafficking)
  • Enlisting young people as soldiers

Content aimed at: 

  • Recruiting potential victims using coercion, fraud, force, threats, inducement, lies, blackmail, or other unlawful means.
  • Coordination, transportation, transfer, housing, or brokering of victims before or during the exploitation to facilitate human exploitation.
  • Human exploitation that is supported, portrayed, or advocated for.
  • Content that promotes or helps human smuggling
  • Image and Privacy Violation Policies Regarding Privacy Rationale

For BITANDEX, maintaining personal information security and privacy is a core value. In an effort to shield you from potential harm, both material and financial, we make every effort to keep your account secure and preserve your personal information. You shouldn't publish someone else's private or sensitive material without first acquiring their permission. We also give consumers tools to report images that they think violate their right to privacy.

Actions Not Allowed (X):

The posting or solicitation of personally identifiable information, such as (but not limited to): 

  • National identification numbers, Social Security numbers, passport numbers, exam numbers, credit/debit card numbers; 
  • Government IDs; 
  • School and education IDs with two of the following: either a name, a picture, or an ID number.
  • Online identities, such as passwords

Content that includes other people's official documents, biometric, genetic, or medical/psychological records

Content that spreads personally identifiable information through external links in order to commit identity theft

Content that encourages identity theft by disclosing the financial details of a company or organization in confidence

Content that makes it easier for identity thieves by revealing the following personal financial details: • Bank account and/or card information 

  • Financial records combined with account details

The following are examples of content that encourages identity theft by disclosing other people's private contact information:

  • Identity information for email, messenger, and chat
  • The aforementioned data may be disseminated to support non-violent services, charity initiatives, or the search for missing persons or animals.
  • Content that is asserted to have come from a source that has been compromised, with the exception of a few newsworthy instances, whether the victim is a well-known person or a regular person.

Content that uses names and personal information to identify specific people, such as: 

  • Driver's licenses; Government IDs other than driver's licenses; passports; marriage, birth, and name change certificates; 
  • Digital identities, such as passwords; 
  • License plates

If any of the following circumstances apply, content that contains images of the exterior of private homes

  • The city or area is stated; 
  • A resident is addressed or seen; 
  • That same resident objects to the exposure of their private residence; 
  • The residence is a single-family home, or the resident's unit number is identified in the image/caption.

Content that reveals an agent's full name or other explicit identification and explicitly mentions their undercover status. Content that contains images identifying the faces of the agent's law enforcement colleagues and explicitly mentions their undercover status.

Unless the safe house is openly promoting its location, contact information, or the kind of service and protection it provides through comments, posts, threads, profiles, or clans, anything that discloses information about safe homes by posting any of the following:

Identifiable city or neighborhood of the safe house, images of the safe house, the safe house's actual address (post boxes only are permitted), or information on the safe house's occupants

The following material could also be taken out

  • A published image or video of individuals in which the individual is:
  • A minor under thirteen years old who reported the content, along with a parent or legal guardian; • a minor between thirteen and eighteen years old who reported the content; • an adult who reported the content while outside of Malaysia and whose local law may grant them the right to have it removed.
  • Any person who is unable to report the information on their own due to incapacity


Unacceptable Content

Hate Speech Policy Justification

Because hate speech fosters an atmosphere of intimidation and exclusion and, in some instances, may encourage actual violence, we do not accept it on BITANDEX.

We define hate speech as an explicit criticism of individuals based on what we refer to as protected characteristics, including race, ethnicity, national origin, religion, sexual orientation, caste, sex, gender, and gender identity. Attacks include those that use physical force, degrading language, claims of inferiority, or exclusionary or segregatory demands. We divide attacks into three categories based on their seriousness, as detailed below.

Sometimes people share materials that contain hate speech created by others to spread awareness or enlighten others. Sometimes, terms or words that would ordinarily be offensive to us are employed in a self-referential or empowering manner. People occasionally show disdain after a breakup in a love relationship. Other times, they employ terminology that is only directed at one gender to restrict participation in a positive support or health group, such as a breastfeeding support group for women. In each of these situations, we permit the content but demand that users make their intentions known in order to better understand why they posted it. We reserve the right to remove information when the purpose is not obvious.

We permit social criticism and humor on these subjects. Moreover, we think that individuals are more accountable when they offer this kind of opinion using their real names.

Actions Not Allowed (X):

Stage 1 Content that targets an individual or group of individuals based on their aforementioned protected characteristic(s) or immigration status with: 

  • Violent speech or support in written or visual form 
  • Dehumanizing speech or imagery in the form of comparisons, generalizations, or unqualified behavioral statements to or about: 
  • Insects 
  • Animals that are cult animals
  • Violent and sexual offenders; subhumanity; sexual predators
  • Other criminals (such as declaring "all [protected characteristic or quasi-protected characteristic] are criminals," "thieves," or "bank robbers," among others).

Denials of existence; mockery of the idea, the incident, or the victims of hate crimes, even when no actual person is shown in the image;   Dehumanizing comparisons, generalizations, or behavioral statements that have been designated (in written or visual form) include, but are not limited to: Black people and apes or ape-like creatures; Black people and farm equipment; Jewish people and rats; Muslim people and pigs; Muslim person and sexual relations with goats or pigs; Mexican people and worm-like creatures; Women as household objects or referring to women as property or "objects"; Tran

Content in Stage 2 that targets an individual or group of individuals based on a protected attribute or characteristics with:

  • Generalizations (written or visual) that portray inferiority in the following ways:
  • Physical impairments include anything related to:
  • Hygiene, such as but not restricted to: filthy, dirty, and odorous
  • Unattractive or repugnant physical characteristics, including but not limited to

The following intellectual capacities are considered to have mental deficiencies: dumb, stupid, and idiots.

  • Education, such as but not limited to: illiteracy and ignorance
  • Mental health, such as but not limited to mental illness, retardation, craziness, and insanity
  • Moral failings are those that pertain to:
  • Character flaws that are seen negatively in society, such as cowardice, lying, haughtiness, and ignorance
  • Negative terminology associated with sexual behavior, such as perverts, whores, and sluts.
  • Mental health, such as but not limited to mental illness, retardation, craziness, and insanity
  • Additional derogatory claims, which we describe as:
  • Phrases that indicate inadequacy, such as but not limited to: worthless and useless
  • Proclamations that one protected characteristic is better or worse than another, such as "I think men are better than women."
  • Phrases that describe deviations from the usual, such as freaks and aberrant

Expressions of contempt, which we describe as: • Self-admission of intolerance based on a protected feature, such as but not limited to: homophobic, islamophobic, or racist

  • Arguments against the existence of a protected attribute; 
  • Expressions of hatred, such as but not limited to: contempt;

Expressions of dismissal, such as "I don't respect," "I don't like," and "I don't care for" Expressions of disgust, or what we characterize as their visual equivalent, which includes:

  • Phrases that imply the subject makes people sick, such as but not limited to: vomit and throw up
  • Words that convey disgust or repugnance, such as but not limited to: horrible, repulsive, or yuck

Using terms like "cunt," "dick," or "asshole" to refer to the target's genitalia or anus is considered cursing.

  • Insulting terms or expressions, such as "fuck," "bitch," or "motherfucker," among others.
  • Phrases that encourage sexual activity, contact with genitalia or anus, or the ingestion of excrement or urine, such as "suck my dick," "kiss my ass," and "eat shit."

Stage 3

Using any of the following, content that targets an individual or group of individuals because of their protected characteristic(s):

  • Propagation of segregation
  • Explicit Exclusion, such as "expel" or "not allowed," but not restricted to these terms.
  • Political exclusion is the denial of the right to participate in politics.

Economic exclusion is described as being denied access to financial benefits and having restricted employment opportunities, and social exclusion is defined as being denied access to places (including online) and social services.

Content that uses slurs—defined as words frequently used as offensive labels for the aforementioned characteristics—to describe or disparage individuals.

Rationale for the Policy on Violence and Graphic Content

We eliminate material that exalts violence or revels in the misery or humiliation of others because it might foster a climate that dissuades involvement. With some restrictions, we permit the use of graphic information to inform viewers about problems. We are aware of how crucial it is for people to be able to talk about pressing topics like terrorism or violations of human rights. Additionally, we are aware that everyone's sensitivity to graphic and violent content varies.

Actions Disallowed (X):

Videos depicting living individuals or deceased subjects in non-medical contexts that show: dismemberment; visible internal organs; partially decomposing bodies

  • People who have been burned or charred, unless they have been cremated or have self-immolated when doing so is a political statement or newsworthy
  • Those who were cannibalized
  • Slitting one's throat

Live feeds of a person being executed

Videos or images that show non-sexual child abuse, which is characterized as: 

  • Repeated kicking, beating, slapping, or stepping on by an adult or animal; 
  • Strangling or suffocating by an adult or animal; 
  • Biting through skin by an adult or animal; 
  • Poisoning by an adult; 
  • Forcible restraint by an adult; 
  • Inflicting burn or cut wounds by an adult; 
  • Tossing, rotating, or shaking Videos of living individuals or deceased individuals in a medical environment that show: dismemberment; visible internal organs; partially decomposing bodies
  • People who have been burned or charred, unless they have been cremated or have self-immolated when doing so is a political statement or newsworthy
  • Those who were cannibalized
  • Slitting one's throat Photos of injured or deceased individuals should not display visible internal organs, dismemberment, or half decomposed bodies.
  • Throat-slitting; Charred or burned individuals; Cannibalism victims the following animal-related material:
  • Videos showing people slaughtering animals without any explicit references to food preparation, consumption, manufacture, or hunting
  • Images of humans torturing or abusing live animals; 
  • Images of animal-to-animal battles in which there are visible insides or non-regenerating bodies are severed, except in the wild;

Videos showing someone or something being killed or otherwise violently killed

Still pictures showing the brutal demise of a person or people

Images that depict the execution of a person

Videos that depict torture being applied to a person or people

Videos of physical abuse or fighting involving minors are circulated with a derogatory caption.

Images of non-medical foreign objects (such metal objects, knives, or nails) being accidentally inserted or being trapped in individuals and causing serious injury

Prenatal images that display

  • Images of newborn babies in an abandonment setting; 
  • Dismemberment; 
  • An abortion or abandonment context


Images of animals in the context of a ritual killing that display their mutilation, their internal organs, or their charring and burning

images of the internal organs in a birthing scene

Religious or cultural imagery of non-medical foreign items being willingly implanted through skin in humans

Reasons for the Adult Nudity and Sexual Activity Policy

We prohibit the exhibition of sexual or nudist content because some members of our community might be sensitive to it. In addition, we automatically delete sexual imagery to stop the spreading of unconsensual or inappropriate information. Digitally produced content is similarly subject to sexual activity restrictions, unless it is published with an instructive, funny, or satirical intent.

Our nudity policies have evolved through time to become increasingly complex. We comprehend that sharing one's nudity might be done for a number of reasons, such as as a form of protest, to bring attention to a subject, or for therapeutic or educational purposes. We allow for the content where such intent is evident. For instance, while we forbid some pictures of female breasts that show the nipple, we permit other pictures like those of protests, breastfeeding women, and pictures of post-mastectomy scars. We also permit pictures of sculptures, paintings, and other works of art that feature naked figures.

Actions Not Allowed (X):

Images of 

  • Real nude adults, where nudity is defined as 
  • Visible genitalia except in the context of giving birth, immediately following giving birth, or health-related situations (such as gender confirmation surgery, cancer examination, or disease prevention/assessment), and 
  • Visible anus and/or fully nude close-ups of buttocks unless photoshopped on a public figure
  • Sexual activity, such as: Sexual intercourse, defined as mouth or genitals entering or in contact with another person's genitals or anus, where at least one person's genitals are nude, except during breastfeeding, childbirth, and postpartum moments, health-related situations (such as post-mastectomy, breast cancer awareness, or gender confirmation surgery), or an act of protest
  • Implied sexual contact, which is when one person's mouth or genitalia come into or come into contact with another person's genitalia or anus, even if the contact is not immediately visible, unless it occurs in a setting related to sexual health, in ads, or in images that are clearly fictional or contain other tell-tale signs of fiction.
  • Implied stimulation of the genitalia or anus, which is defined as stimulating the genitalia or putting objects into the genitalia or anus even when the activity is not immediately apparent, unless it occurs in the context of sexual health, in ads, in images that are clearly fictional, or with other markers of fiction.
  •   Erections, the presence of sexual by-products, the stimulation of genitalia or the anus, whether exposed or covered by clothing, the use of sex toys, whether exposed or covered by clothing, and the stimulation of exposed human nipples are just a few examples of other sexual behaviours.

Fetish content that contains: 

  • Acts that are likely to result in the death of a person or animal; 
  • Dismemberment; 
  • Cannibalism; 
  • Squeezing of the female breast outside of breastfeeding situations; 
  • Fetish content that involves feces, urine, spit, snot, menstruation, or vomit.

Unless one or more of the following circumstances apply: 

  • The sexual activity (intercourse or other sexual acts) is not clearly evident in the material; 
  • The content was published in a satirical or funny context;
  • Imagery is insufficiently detailed, showing merely the body's contours or forms; the content was posted in an instructional or scientific context

Reasons for the Sexual Solicitation Policy

People utilize BITANDEX to talk about and raise awareness of sexual violence and exploitation, as mentioned in Section 8 of our Community Standards (Sexual Exploitation of Adults). We want to make room for this conversation because we understand its significance. However, we draw the line when content arranges, promotes, or enables adult sexual interactions. We also forbid the use of sexually explicit language that might encourage solicitation because certain members of our global community may find such language offensive and because it might make it harder for users to interact with their friends and the larger community.

Actions Not Allowed (X):

Coordination or recruitment attempts for adult sex acts, including but not restricted to:

  • Pornographic activities, strip clubs, live sex performances, and erotic dances; 
  • Filmed sexual activities;
  • Tantric, erotic, or sexual massages explicit sexual solicitation includes, but is not limited to, providing or requesting:
  • Sexual activity or partners
  • Sexual discussions or chats
  • Images and movies that are naked Content that satisfies both of the subsequent requirements

Criteria 1: Offer or Ask The content implicitly or indirectly* (usually by mentioning a way to contact the author) requests or offers:

  • Sex or sexual partners; 
  • Nude pictures; 
  • Sex chat discussions
  • Suggestive Elements, Criteria 2
  • Content uses one of the sexually provocative aspects listed below to make the aforementioned offer or request:
  • Regional sexualized terminology, contextually relevant and frequently sexual emojis, sex chat discussions, or
  • Images of real people with their nudity obscured by human parts, objects, or digital obstruction, such as long shots of fully nude butts; 
  • Mentions or depictions of sexual activity (including hand-drawn, digital, or real-world art) such as: sexual roles, sex positions, fetish scenarios, state of arousal, act of sexual intercourse or activity (sexual penetration or self-pleasuring); or

To be considered unlawful, it must violate Criteria 1 (offer or ask) and subtly or overtly offer or request sexual favours.

For instance, it is not unlawful if the material is a hand-drawn representation of sexual action that does not ask for or give sexual favours.

a request or offer for pornographic content (including, but not limited to, sharing of links to external pornographic websites)

Explicit sexual language that includes more than just a passing mention of: 

  • A state of sexual arousal (wetness or erection) or 
  • A sexual act (sexual penetration, self-pleasuring or exercising fetish scenarios) brutal and callous


Policy Justification

We think that when people don't feel like their weaknesses are being exploited, they can connect and share more easily. As a result, we have stricter standards for material that we classify as cruel and insensitive, or material that specifically targets people who would suffer severe bodily or emotional harm.

We eliminate overt victim-mocking attempts and flag cruel implicit ones, many of which come in the form of memes and GIFs.

Actions Not Allowed (X):

Content that shows actual people and mocks or makes light of their early demise, fatal illness, or disability, famine, physical assault, or serious physical harm.

Any text or visual representation of actual persons who have suffered an early death, a significant bodily injury, physical abuse, or domestic violence.

Images of actual animals engaging in any of the following—aside from staged animal-on-animal fights and animal fights in the wild—and being mocked, made fun of, or including sadistic remarks

Premature death, severe physical harm, including mutilation, and physical assault by a human

Integrity and genuineness


Policy Justification

Because we do not want to permit content that is intended to deceive or that tries to mislead people in order to enhance viewership, we work very hard to minimize the spread of spam. This content hinders people from participating honestly in online groups and causes a bad user experience. Additionally, we work to stop anyone from exploiting our platform, goods, or services to boost false viewership or mass-distribute content for selfish financial benefit.

Actions Not Allowed (X):

  • Create accounts, groups, pages, events, or other assets either manually or automatically at very high frequency. 
  • Post and share content.
  • Attempting to sell, buy, or swap website privileges or product features such as accounts, admin and moderator positions, posting permission, profiles, businesses, clans, likes, etc.; or successfully doing so.
  • Demand or imply that users must interact with content (by sharing or liking it) in order to view or use the promised features.
  • Promote clicks, likes, shares, followers, or the use of websites or applications while making fraudulent claims, such as:
  • Promising features or functionality that are misleading or fictitious (such as "Get a "Dislike" button!").
  • Failing to direct to material that was promised (fake play buttons, for example, "Click here for a discount code at Nordstrom").
  • Distracting consumers from BITANDEX by using URLs in a fraudulent or misleading manner, as follows:

Cloaking involves showing alternate material to BITANDEX users and crawlers or tools for BITANDEX.

  • False information: Information that has a link that promises one kind of information but actually provides a very different one.
  • Deceptive Pop-up websites: These are websites that demand an action (captcha, watch an advertisement, click here) before displaying the content of the anticipated landing page, and the domain name of the URL changes after the action is finished.

Landing pages that demand users to like, share, or otherwise interact with content before granting access to off-BITANDEX content are known as "Like / Share-Gating."

  • False User Interface: Websites with false user interfaces that cause unintentional traffic to be created (pop-ups/under, clickjacking, etc.).
  • Impersonation: The website ( claims to be a respectable brand or service by employing a name, domain, or material that contains typos, misspellings, or other techniques to impersonate well-known businesses in order to deceive visitors.
  • As well as more actions that are very similar to those mentioned above.

Cybersecurity Policy Justification

We understand that the protection of our users' personal information extends to their safety. The genuine, open, and secure environment that we wish to promote is damaged by attempts to get sensitive personal information through false or intrusive means. As a result, we forbid attempts to misuse our platform and products in order to collect sensitive user information.

Actions Not Allowed (X):

unauthorized attempts to compromise user accounts or collect sensitive information include

  • Accessing another person's account or user information without that person's express authorization.
  • Encouraging or misleading users and other entities to download or use files or programs that endanger their data security online. If such files or programs damage or provide unauthorized access to a computer, device, or network, they are referred to as malicious software, or "malware."
  • Obtaining or seeking another user's login information, either directly or subtly via phishing scams (e.g. fake surveys designed to capture log-in info or links to fake login pages or impostor websites).
  • Making an attempt to get another person's sensitive information, such as their username, password, or other personal information, by using dubious tactics, malicious software, or dangerous websites.
  • Posting your login information or the login information of others on a public forum or through a third-party service.
  • Developing, disseminating, or hosting harmful software or browser add-ons to access user data or compromise accounts.
  • Providing online infrastructure, such as Web hosting services, DNS servers, and ad networks that permit abusive links so that the majority of those links on BITANDEX are in violation of the Community Standards' sections on spam or cybersecurity.

Reasons for the Inauthentic Behavior or Impersonation Policy

Because we value authenticity, we forbid users from impersonating others or falsely representing themselves on BITANDEX, using fake accounts to inflate the popularity of content, or acting in ways that would permit other violations of our Community Standards. The goal of this policy is to foster an environment where individuals can have faith in the communities they engage with.

Actions Not Allowed (X):

  • Make use of several BITANDEX accounts or distribute accounts among other persons.
  • Engage in or assert to engage in Inauthentic Behavior, which is defined as the use of BITANDEX assets (accounts, profiles, clans, or events), to deceive people or BITANDEX: 
  • Misuse BITANDEX reporting systems to harass others; 
  • Hide a company profile's purpose by deceiving users about the ownership or control of that company profile;

to avoid enforcement of our Community Standards. 

  • about the identity, function, or origin of the entity they represent. 
  • about the popularity of BITANDEX material or assets. 
  • about the function of an audience or community. 
  • about the source or origin of content.
  • Engage in, or assert that you are engaging in, coordinated unauthentic behavior, which is defined as the coordinated use of several BITANDEX resources to engage in unauthentic behavior (as defined above), where the use of fictitious accounts is the operation's main component.
  • Engage in or assert that you are engaging in coordinated unauthentic behavior on behalf of a foreign or government actor, often known as foreign or government interference.

False News Policy Justification

We take our obligation to limit the dissemination of incorrect information on BITANDEX very seriously. We also understand that this is a difficult and delicate matter. Without suppressing constructive public dialogue, we wish to assist individuals in staying informed. The distinction between satire or opinion and false news is equally blurry. Due to these factors, we don't remove erroneous information from BITANDEX; rather, we greatly decrease its distribution by placing it lower in the Feed Section.

Actions Not Allowed (X):

By disrupting the financial incentives for users, businesses, clans, and domains that spread misinformation, as well as by using various signals, such as feedback from our community, to inform a machine learning model that predicts which stories may be false, as well as by reducing the distribution of content rated as false by independent third-party fact-checkers, we are working to create a more informed community and reduce the spread of false news.

Media Policy Justification Manipulated

Numerous editing techniques can be used on media, whether it be images, audio, or video. These alterations are frequently benign, like a filter effect on a picture. Other times, the manipulation is subtle and might deceive, especially when it comes to video content. When the requirements listed below are satisfied, we want to eliminate this category of altered material.

Additionally, we will keep investing in collaborations (with academics, journalists, and independent fact-checkers, among others) to help us stop the spread of incorrect information and misinformation and to help people be better informed about the content they encounter online.

Actions Not Allowed (X):

Video that has been edited or synthesized in ways that are not obvious to the typical person, beyond changes for clarity or quality, and that is likely to deceive the average person into thinking that a subject of the video stated something that they did not say AND • is the end result of artificial intelligence (AI) or machine learning, especially deep learning techniques (e.g., a technical deep fake), that merges, mixes, replaces, and/or superimposes content onto a video to produce a video that looks real.

  •   This policy does not apply to content that is parodic or satirical, or that has been altered to omit or rearrange actual speech.

Policy on Intellectual Property Rationale

Intellectual property rights are vital to BITANDEX because they support freedom of expression, innovation, and creativity in our society. Your privacy and application options allow you to manage how the material and information you submit on BITANDEX are shared. However, be sure you have the permission to do so before posting any content on BITANDEX. Please respect the copyrights, trademarks, and other legal rights of others. We are dedicated to assisting individuals and groups in promoting and safeguarding their intellectual property rights. The terms of service for BITANDEX prohibit users from posting materials that infringe on another person's copyright and trademark.

We will remove or limit content that violates the following upon learning of it from a rights holder or their authorized representative: Copyright infringement Trademark infringement

Requests Related to Content

user demand

We adhere to:

When a person requests the deletion of their own account, when a confirmed member of the user's immediate family or the executor wants the deletion of the account of a deceased user, and when an authorized representative requests the deletion of the account of an incapacitated user.

Additional Minor Protection

We adhere to:

  • Government requests to remove child abuse imagery showing, for example, an adult beating a child or an adult strangling or choking a child; 
  • Legal guardian petitions to remove attacks on unintentionally famous minors;