API Acceptable Use Policy (2024)

This Acceptable Use Policy (AUP) covers the use of the Nexus Mods API in all third party websites, applications or other use cases. As an extension of our Fair Use Policy, it is meant to inform developers of what is and is not acceptable when it comes to requesting and using data from our services.

We provide an open API for developers and their applications to interact with our database. This access is offered freely in the spirit of facilitating the development of modding-related applications for the benefit of the modding community.

It is the responsibility of the application developer to ensure their compliance with the standards laid out in this document. Failure to meet these standards, intentionally or otherwise, may result in the Nexus Mods team taking action to prevent further use of our data by your application.

Personal API keys

All users have the ability to generate a Personal API key, from the API Access page. This is intended to allow users to experiment with our API without using the keys assigned to a registered application.

We tolerate the use of your personal API key with applications that are in the testing stage of development or are intended for personal use only. Please note that as soon as a public-facing application has left the testing stage and is intended to be utilised by a wider audience (i.e. end-users rather than a select group of testers) you should contact support@nexusmods.com to register your application as described in the registration process in this document.

We do not endorse or support the use of personal API keys in lieu of API keys generated for a public-facing application outside of the testing scenario described above and reserve the right to prevent abuse of personal API keys where applicable.

Registration process

In cases where your application is intended to be public-facing, we require you to contact the Nexus Mods support team once you have a testing build of the application which demonstrates the intended usage of our API. This will allow us to ensure not only that your application complies with this policy, but that it further does not consume an excess amount of API requests (which may result in users being rate limited).

In order to get your application registered, please follow these simple steps:

  1. Contact our support team (support@nexusmods.com) and include a testing build of your application which can be used with a personal API key.
  2. Make any necessary changes to your application, then send us a name, short description and logo for your application. This will be displayed on the API Access page. All logos should be reasonably high resolution and be visible when displayed on a dark background.
  3. Your application will then be issued a "slug" for use with the SSO.

Registered applications are listed on the API Access page accessible via the site preferences. Users have the ability to revoke the API key issued to your application at any time.

Once your application has been registered you will be able to take advantage of our Single Sign-On (SSO) system. Although this is not a requirement, it is the most convenient way for users to add their API key to your application.

Please note that us registering an application does not imply an endorsem*nt of the application, nor do we take any responsibility for the application functioning as intended.

API access and open source

In the spirit of fostering cooperation between developers and in the modding community in general, we provide an open API and we release all of our software and tools as open source.

Therefore, we strongly encourage any applications using our API to make use of open-source licensing, too. We reserve the right to deny registration to any applications if we have doubts about the nature of the application itself, the way our data and our users’ data is handled, or that the underlying code is fully complying with this policy.

Including the source code with your registration request will allow us to gain a better understanding of your application's intended purpose and may speed up the registration process.

Request Headers

When sending requests to the Nexus Mods API, we ask that you add appropriate information to the request header which identifies your application. Specifically including these fields:


Application-Version (e.g. "1.2.0") Please ensure this reflects the current release.
Application-Name (eg. "Vortex") Please keep this consistent across versions of your application.

This information will allow us to track usage of your application and inform you of any odd usage patterns which may be caused by a bug in the software.

Unacceptable Usage

The following describes a number of example scenarios where the API or data retrieved from the API are being used improperly. Applications accessing our services in a comparable way may be actively blocked from using our API.

  • Fetching data en-masse with the intent to rehost this information on your own service (i.e. scraping).
  • Storing user API keys on your own server and/or using them without the action being initiated by the user.
  • Using personal API keys for a public-facing application.
  • Sending request metadata which is either blank or impersonates another application.

Please note that this is a non-exhaustive list and that we reserve the right to deem any usage which is detrimental to the modding community or Nexus Mods unacceptable at our sole discretion, with or without providing a reason.

API Acceptable Use Policy (2024)

FAQs

What are three key elements of an effective acceptable use policy (AUP)? ›

A comprehensive AUP typically covers a wide range of topics, including acceptable use guidelines, prohibited activities, and consequences for policy violations.

What happens if the acceptable usage policy isn't adhered to? ›

Consequences may range from suspension to information being turned over to law enforcement depending on the violation and the organization's policies. Having users break the law on your network can become a liability for your business, which is why outlining these prohibited activities in your AUP is so essential.

How to write an acceptable use policy? ›

Acceptable use policy template
  1. Define the Purpose.
  2. Determine the scope.
  3. Research and benchmarking.
  4. Outline acceptable uses.
  5. Detail prohibited uses.
  6. Address system and network activities.
  7. Set email and communication standards.
  8. Discuss software and intellectual property.
Jan 4, 2024

Is IT important to read an acceptable use policy? ›

An AUP helps protect sensitive information in businesses and ensures employees use company resources productively. It sets boundaries for acceptable online behavior, preventing activities like accessing inappropriate websites, sharing confidential information, or downloading malicious software.

What are three things that might be included in an acceptable use policy? ›

An acceptable use policy usually:
  • Includes specific rules, such as no video pirating.
  • Outlines consequences for breaking the rules, such as warnings or suspension of access.
  • Details an organization's philosophy for granting access (for example, internet use is a privilege that can be revoked, rather than a right)
Mar 21, 2022

What are examples of AUP rules? ›

For example, it can include guidelines about the length of passwords, safe use of Wi-Fi, clean desks, sending personal data over email, or private use of company equipment, like laptops and smartphones. The purpose of the AUP is to create the field for the organisation to play on.

What examples would be a violation to the acceptable use policy? ›

Prohibited activities include, but are not limited to: • Transmitting any defamatory, libelous, fraudulent, deceptive, indecent, offensive or obscene materials; Page 3 • Using the Services to deliver spyware, or secretly or deceptively obtain the personal information of third parties (e.g., phishing); • Intentionally ...

What happens if you break the acceptable use policy? ›

In addition to defining acceptable and unacceptable behaviors, an AUP also addresses the consequences of violating the policy. This may include disciplinary actions such as warnings, suspension of privileges, or even termination of employment.

Are acceptable use policies legally binding? ›

Remember that an AUP is a legally binding contract that users must agree to before receiving service.

What are the consequences of non-compliance with an Acceptable Use Policy? ›

Additionally, sometimes damages are irreparable and have serious reputational consequences. Therefore non-compliances may lead to the removal of IT equipment, services and account privileges. In some cases, disciplinary measures might be pursued, which may also lead to legal action.

What is the primary purpose of an Acceptable Use Policy? ›

The primary purpose of an AUP is to protect the organization's interests, assets, and reputation. By establishing clear guidelines, an AUP helps prevent misuse, unauthorized access, and other behaviors that could compromise the organization's information and employees.

What should the Acceptable Use Policy cover and why? ›

An AUP sets rules related to an organization's IT security policies. These include rules around accessing restricted information; changing access data, such as passwords; opening questionable email attachments; using public Wi-Fi services; and using company approved authentication procedures. Non-employee users.

What should not be part of an acceptable use policy? ›

Encryption policies not be part of an acceptable use policy.

We should not allow ADVERSITY to discourage us .

Who owns the acceptable use policy? ›

An acceptable use policy (AUP) (also acceptable usage policy or fair use policy (FUP)) is a set of rules applied by the owner, creator, possessor or administrator of a computer network, website, or service that restricts the ways in which the network, website or system may be used and sets guidelines as to how it ...

What is strictly prohibited as per the acceptable use policy? ›

This prohibition includes, but is not limited to, the use or transmission of any data that is protected by copyright, trademark, trade secret, patent or other intellectual property right without proper authorization and the transmission of any material that constitutes an illegal threat, violates export control laws, ...

What are the three key elements of policy? ›

Every policy has three key elements: a problem definition, goals to be achieved, and the policy instruments to address the problem and achieve the goals.

What are the principles of AUP? ›

AUP emphasizes collaboration, communication, and customer-centricity in the development process. AUP provides a flexible and adaptable framework that can be tailored to the specific needs of the project.

What is one important feature of an AUP? ›

The Purpose of an AUP

It establishes clear boundaries for employees and users, effectively reducing ambiguity and potential conflicts. By outlining specific guidelines and rules, an AUP educates users about responsible and ethical technology usage, fostering a culture of digital responsibility.

What does an AUP contain? ›

An acceptable use policy (AUP) (also acceptable usage policy or fair use policy (FUP)) is a set of rules applied by the owner, creator, possessor or administrator of a computer network, website, or service that restricts the ways in which the network, website or system may be used and sets guidelines as to how it ...

References

Top Articles
Zeppelin 8662-3 New Captains Line Automatic Mens Watch 43mm 5ATM
Zeppelin 8662-3 Men's watch
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
Winston Salem Nc Craigslist
Coverage of the introduction of the Water (Special Measures) Bill
Prosper TX Visitors Guide - Dallas Fort Worth Guide
Georgia Vehicle Registration Fees Calculator
Roblox Developers’ Journal
Craigslist Dog Sitter
Mikayla Campinos Videos: A Deep Dive Into The Rising Star
Blue Ridge Now Mugshots Hendersonville Nc
DIN 41612 - FCI - PDF Catalogs | Technical Documentation
Med First James City
Watch TV shows online - JustWatch
3472542504
TS-Optics ToupTek Color Astro Camera 2600CP Sony IMX571 Sensor D=28.3 mm-TS2600CP
How to find cash from balance sheet?
Mineral Wells Independent School District
Bfg Straap Dead Photo Graphic
Log in or sign up to view
1v1.LOL - Play Free Online | Spatial
Epguides Strange New Worlds
Juicy Deal D-Art
Iu Spring Break 2024
What Is The Lineup For Nascar Race Today
Surplus property Definition: 397 Samples | Law Insider
Best Boston Pizza Places
پنل کاربری سایت همسریابی هلو
fft - Fast Fourier transform
Restaurants In Shelby Montana
Skidware Project Mugetsu
Anesthesia Simstat Answers
Perry Inhofe Mansion
new haven free stuff - craigslist
Royal Caribbean Luggage Tags Pending
Babbychula
Garrison Blacksmith's Bench
Morlan Chevrolet Sikeston
Darrell Waltrip Off Road Center
Michael Jordan: A timeline of the NBA legend
877-292-0545
2007 Peterbilt 387 Fuse Box Diagram
Appraisalport Com Dashboard Orders
Clima De 10 Días Para 60120
Nid Lcms
Portal Pacjenta LUX MED
20 Mr. Miyagi Inspirational Quotes For Wisdom
Mejores páginas para ver deportes gratis y online - VidaBytes
Muni Metro Schedule
San Diego Padres Box Scores
Estes4Me Payroll
Epower Raley's
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 5365

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.