6ix — Cybercrimes Legal Notice

Last updated: 2025-10-28

Global scopeMonitoringAnti-abuseConsentLawful processPrivacy by design
Notice

Global Application

This notice applies globally. 6ix reserves the right to enforce these standards in any country where our products are used, in addition to local law.
Notice

Plain-Language Summary

This is a product-focused legal notice for safety and compliance awareness. It is not legal advice. For binding law, refer to applicable statutes and consult counsel.

This page outlines how 6ix addresses cybercrime-related behavior on our platform. While it references themes found in Nigeria’s Cybercrimes (Prohibition, Prevention, etc.) Act, 6ix applies comparable safety standards globally. We may take action on conduct that violates law or our rules in any country where 6ix is accessed. Read alongside our Community Guidelines, Terms of Use, Privacy Policy, Cookies Policy, Safety & Minors, Ads Policy, and Copyright/DMCA.

1) Global Scope & Enforcement Principles

Back to top

Legality + Policy

6ix evaluates both applicable law and our own rules. Conduct can be restricted on 6ix even if it does not meet a criminal threshold in your jurisdiction, and we may act where content or behavior creates material risk to users, infrastructure, or the public.

Necessity & Proportionality

Our actions are tailored to risk and context. We balance safety, user rights, and product integrity to select the least intrusive effective measure—ranging from labels to removals to account restrictions.

User Notice (Where Lawful & Safe)

Where permitted by law and not likely to cause harm, we notify users of significant enforcement and provide avenues for appeal or review. See Enforcement & appeals.

Privacy by Design

Safety work is constrained by privacy principles and our Privacy Policy (data minimization, access controls, logging, and need-to-know).

2) Monitoring, Detection & Anti-Abuse

Back to top

6ix deploys layered controls to identify and mitigate cybercrime-adjacent risks while respecting privacy:

Signals & Heuristics

We use behavioral and systems signals (suspicious session patterns, credential-stuffing signatures, repeated failed logins, abnormal DM invite bursts, device fingerprint anomalies) to detect abuse early.

Rate Limits & Friction

Progressive rate limits, proof-of-work challenges, cool-downs, and risk-based verification reduce automated attacks (spam bursts, brute forcing, mass scraping).

Integrity Lists

Known-bad indicators (compromised tokens, disposable domains used for abuse, previously flagged hashes) may be used to block or downrank activity.

Media & Metadata Checks

Where appropriate, we apply hashing/fingerprinting for known illegal material, and metadata checks for obvious anomalies (e.g., spoofed mime types used in malware delivery).

Human-in-the-Loop

Trained reviewers handle escalations and edge cases to avoid over-blocking and to calibrate automation.

Abuse Research

We continuously test adversarial behaviors (spam kits, replay attacks, social engineering patterns) to strengthen defenses and update rules.
Notice

Security Research & Responsible Disclosure

Security researchers can responsibly disclose vulnerabilities to security@6ixapp.com. Do not exploit or access user data; provide clear reproduction steps. We’ll acknowledge valid reports and prioritize fixes.

3) Key Offenses & Platform Rules

Back to top

The themes below align with Nigeria’s Cybercrimes Act framing and similar global concepts. They describe 6ix platform rules (not legal advice) and give examples we enforce against.

A) Unauthorized Access to Devices (Section 3) — No hacking or account intrusion

Allowed (examples)

  • Use your own account and devices; enable 2FA.
  • Report suspected 6ix vulnerabilities to security@6ixapp.com with proof-of-concept only, no data exfiltration.

Not allowed on 6ix

  • Logging into another person’s 6ix account without consent (including ‘testing’).
  • Buying/selling 6ix login details or session tokens.
  • Brute forcing or credential stuffing 6ix authentication flows.

Benchmark (statutory summary): up to ~5 years’ imprisonment in Nigeria; other regions vary.

B) Data Tampering (Section 4) — Do not alter or destroy others’ data

Allowed (examples)

  • Editing/removing your own content using provided features.
  • Moderating your own room per 6ix rules (mute, remove, lock).

Not allowed on 6ix

  • Deleting others’ posts via exploit or stolen admin credentials.
  • Injecting scripts to corrupt chat logs, replays, or metrics.

Benchmark: up to ~5 years’ imprisonment in Nigeria; other regions vary.

C) Disclosure of Critical Information (Section 5) — No posting harmful infrastructure details

Allowed (examples)

  • Non-sensitive tech discussion and good-faith security topics.
  • Private, coordinated disclosure to security@6ixapp.com for 6ix-specific issues.

Not allowed on 6ix

  • Dumping credentials, keys, or exploit sequences intended for public harm.
  • Publishing confidential infrastructure runbooks or bypass procedures.

Benchmark: up to ~15 years’ imprisonment in Nigeria; other regions vary.

D) Recording Private Conversations (Section 10) — Get consent; obey local laws

Allowed (examples)

  • Turning on replays with visible UI indicators; obtain consent where required.
  • Saving your own content clearly and lawfully.

Not allowed on 6ix

  • Secretly recording private calls/DMs.
  • Publishing recordings with private data without permission.

Benchmark: up to ~2 years’ imprisonment in Nigeria; other regions vary.

E) False or Misleading Information (Section 19) — No intentional deception that causes harm

Allowed (examples)

  • Clearly labeled satire/opinion.
  • Honest mistakes corrected promptly with updates.

Not allowed on 6ix

  • Investment, giveaway, or crypto scams.
  • Deceptive content likely to cause public harm (fake emergencies, harmful medical claims).

Benchmark: up to ~2 years’ imprisonment in Nigeria; other regions vary.

F) Online Harassment & Abuse (Section 22) — No targeted harassment

Allowed (examples)

  • Criticism of ideas or content without attacking protected characteristics.
  • Using block/mute to manage interactions.

Not allowed on 6ix

  • Threats, demeaning slurs, brigading or stalking.
  • Doxxing (posting home addresses, IDs, non-public contacts).

Benchmark: up to ~2 years’ imprisonment in Nigeria; other regions vary.

G) Incitement of Ethnic/Religious Hatred (Section 24) — Zero tolerance

Allowed (examples)

  • Contextualized reporting or academic discussion (no advocacy of harm).
  • Supportive speech for inclusion and human rights.

Not allowed on 6ix

  • Calls to violence against groups/communities.
  • Dehumanizing content designed to provoke harm.

Benchmark: penalties may reach life imprisonment in Nigeria; other regions vary.

4) Administrator Duties (Rooms, Channels, Communities)

Back to top

Set Clear Rules

Publish room/channel rules aligned with the Community Guidelines. Use content tags and audience settings thoughtfully.

Use Tools Proactively

Enable slow mode, invite approvals, keyword filters, and restricted DMs where appropriate. Remove repeat violators and escalate severe cases.

Escalate When Needed

Report child-safety issues, credible threats, doxxing, exploit attempts, and scams immediately via in-app reporting and email when necessary (safety@6ixapp.com).

Accountability

Repeated failure to moderate obvious violations in your space may lead to feature limits or account actions. See Enforcement & appeals.

5) Account & Device Safety

Back to top

Authentication

Use strong, unique passwords and enable 2FA. Avoid password reuse across services. Do not share codes or recovery tokens with anyone.

Session Hygiene

Review active sessions; revoke unknown devices. Beware of “support” impostors requesting codes.

Device Security

Keep OS and apps updated; enable disk encryption; install from official stores; run reputable AV where appropriate.

Phishing & Social Engineering

Verify URLs; be skeptical of urgent payment/crypto requests. 6ix staff will not ask for passwords or 2FA codes. Report suspicious emails or messages.

6) Incident Response & Evidence Handling

Back to top

Intake & Triage

We prioritize imminent harm, child safety, and account compromise. We capture minimal data needed for remediation consistent with our Privacy Policy.

Containment & Remediation

Actions may include session invalidation, password resets, temporary locks, content restrictions, or rollback of malicious changes.

Evidence Preservation

For credible reports, relevant logs and artifacts may be preserved for a limited period to support security, appeals, or valid legal process, in line with Retention.

User Communication

Where lawful and safe, we notify impacted users of significant incidents with practical steps to secure their accounts and devices.

7) Fraud, Payments & Marketplace Integrity

Back to top

Prohibited Conduct

No self-dealing (circular tips, buying your own items), unauthorized chargebacks, fake scarcity, or misleading pricing. No laundering or funneling proceeds from illegal activity via 6ix.

Signals & Holds

Sudden spikes, mismatched KYC details, or dispute clusters may trigger temporary payout holds or rolling reserves while we review. See Refunds & Chargebacks.

Verification (KYC/AML)

Payouts require identity verification. We may request additional information based on risk. See Verification.

Advertising Integrity

Creator brand deals must follow disclosure rules and category restrictions. See Ads Policy.

8) Live Streams, Calls & Recording (Consent)

Back to top

Consent Requirements

Recording and replays are optional. If enabled, use visible indicators and follow local consent laws for all participants’ locations. See Streaming, Calls & Recording.

Safety Controls

Use moderation tools (filters, slow mode, follower-only chat) and remove abusive users promptly. Avoid streaming illegal acts or dangerous challenges.

Minors

Zero tolerance for exploitation. Follow Safety & Minors. Limit location exposure and sensitive identifiers in streams.

Post-Event Handling

If a violation occurs, remove the content, preserve necessary evidence, and file a report. Consider disabling replays until the issue is addressed.

9) Reporting & Cooperation with Authorities

Back to top

In-App Reporting

Use the report button on content or profiles. Provide links, timestamps, and context. This speeds up review and accurate routing.

Emergency Situations

For imminent danger to life or serious physical harm, contact local authorities first, then notify us.

Lawful Process

We respond to valid legal process and may preserve data briefly pending process, consistent with Law Enforcement Guidelines.

User Notice

Where lawful and safe, we notify users of requests or actions that affect them, and we may provide time for legal remedies.

10) Regional Notes & Global Application

Back to top

Nigeria Reference

The offense categories above map to frequently cited sections of Nigeria’s Cybercrimes Act for user awareness. Actual legal outcomes depend on courts and facts.

Other Jurisdictions

Similar conduct (unauthorized access, data tampering, unlawful recording, incitement, fraud) is generally restricted elsewhere. If your local law is stricter, you must follow it.

Strictest Standard Wins

For cross-border rooms/calls, follow the strictest applicable consent and safety standard among the participants’ locations.

11) FAQ (Plain Language)

Back to top
Does 6ix record my conversations by default?
No. Recording is off by default and is an optional host feature. If enabled, we show in-product indicators. Follow consent laws in all relevant locations.
Can I post leaked passwords if they’re already public elsewhere?
No. Credentials, tokens, and exploit paths intended for harm are prohibited on 6ix.
What if I’m doxxed on 6ix?
Report in-app and email safety@6ixapp.com with links and screenshots. We remove and act on violations.
Are admins responsible for everything users post in their rooms?
Admins must enforce rules and remove clear violations. Repeated failure can result in admin tool limits or account action.
Do you share data with authorities?
Only in response to valid legal process or emergencies, consistent with Law Enforcement Guidelines and Privacy Policy.

12) Definitions & Practical Examples

Back to top

Unauthorized access

Using someone’s account/device without permission (e.g., stolen password, token hijack, session fixation).

Examples

  • Logging into an influencer’s account using leaked credentials.
  • Hijacking a session cookie from a public computer.

Data tampering

Altering/destroying data you don’t control (e.g., deleting others’ content via exploit, corrupting chat archives).

Examples

  • Injecting scripts to wipe a rival’s stream comments.
  • Using stolen admin credentials to purge evidence.

Critical information

Sensitive infrastructure details where exposure could endanger public safety or enable serious compromise.

Examples

  • Publishing private keys or emergency override codes.
  • Dumping detailed exploit steps targeting critical systems.

Private conversation

Non-public call/room/DM with a reasonable expectation of privacy.

Examples

  • Locked team room with invite-only access.
  • 1:1 call with recording disabled.

Incitement

Expressions that encourage violence or hatred against protected groups or communities.

Examples

  • Calls to attack a group at a particular time/place.
  • Dehumanizing language that advocates harm.

13) 6ix Enforcement Actions & Appeals

Back to top

Graduated Response

We apply context-sensitive penalties: content labels or removals, reach reduction, feature limits, temporary suspensions, and in severe cases, termination.

Zero-Tolerance Areas

Child exploitation, clear threats of violence, doxxing of highly sensitive personal info, and egregious hacking attempts trigger fast, strict action.

Appeals

Where available, users can appeal moderation decisions in-app. Provide clear context and any corrective steps taken.

Repeat Violations

Repeated offenses escalate penalties and may lead to permanent loss of features or accounts.

15) Updates & Versioning

Back to top

We may update this notice as laws evolve or product features change. For material updates, we’ll provide reasonable notice (e.g., in-app or email). Continued use after the effective date constitutes acceptance.

16) Contact

Back to top

Safety & Abuse

  • Email: safety@6ixapp.com
  • Use in-app reporting for fastest review
  • Include links, timestamps, and screenshots

Legal & Privacy

  • Legal: legal@6ixapp.com
  • Privacy: privacy@6ixapp.com
  • Security: security@6ixapp.com

For additional information, review our Privacy Policy, Law Enforcement Guidelines, and Transparency Report (when available).