6ix — Cybercrimes Legal Notice
Last updated: 2025-10-28
Global Application
Plain-Language Summary
This page outlines how 6ix addresses cybercrime-related behavior on our platform. While it references themes found in Nigeria’s Cybercrimes (Prohibition, Prevention, etc.) Act, 6ix applies comparable safety standards globally. We may take action on conduct that violates law or our rules in any country where 6ix is accessed. Read alongside our Community Guidelines, Terms of Use, Privacy Policy, Cookies Policy, Safety & Minors, Ads Policy, and Copyright/DMCA.
1) Global Scope & Enforcement Principles
Back to topLegality + Policy
Necessity & Proportionality
User Notice (Where Lawful & Safe)
Privacy by Design
2) Monitoring, Detection & Anti-Abuse
Back to top6ix deploys layered controls to identify and mitigate cybercrime-adjacent risks while respecting privacy:
Signals & Heuristics
Rate Limits & Friction
Integrity Lists
Media & Metadata Checks
Human-in-the-Loop
Abuse Research
Security Research & Responsible Disclosure
3) Key Offenses & Platform Rules
Back to topThe themes below align with Nigeria’s Cybercrimes Act framing and similar global concepts. They describe 6ix platform rules (not legal advice) and give examples we enforce against.
A) Unauthorized Access to Devices (Section 3) — No hacking or account intrusion
Allowed (examples)
- Use your own account and devices; enable 2FA.
- Report suspected 6ix vulnerabilities to security@6ixapp.com with proof-of-concept only, no data exfiltration.
Not allowed on 6ix
- Logging into another person’s 6ix account without consent (including ‘testing’).
- Buying/selling 6ix login details or session tokens.
- Brute forcing or credential stuffing 6ix authentication flows.
Benchmark (statutory summary): up to ~5 years’ imprisonment in Nigeria; other regions vary.
B) Data Tampering (Section 4) — Do not alter or destroy others’ data
Allowed (examples)
- Editing/removing your own content using provided features.
- Moderating your own room per 6ix rules (mute, remove, lock).
Not allowed on 6ix
- Deleting others’ posts via exploit or stolen admin credentials.
- Injecting scripts to corrupt chat logs, replays, or metrics.
Benchmark: up to ~5 years’ imprisonment in Nigeria; other regions vary.
C) Disclosure of Critical Information (Section 5) — No posting harmful infrastructure details
Allowed (examples)
- Non-sensitive tech discussion and good-faith security topics.
- Private, coordinated disclosure to security@6ixapp.com for 6ix-specific issues.
Not allowed on 6ix
- Dumping credentials, keys, or exploit sequences intended for public harm.
- Publishing confidential infrastructure runbooks or bypass procedures.
Benchmark: up to ~15 years’ imprisonment in Nigeria; other regions vary.
D) Recording Private Conversations (Section 10) — Get consent; obey local laws
Allowed (examples)
- Turning on replays with visible UI indicators; obtain consent where required.
- Saving your own content clearly and lawfully.
Not allowed on 6ix
- Secretly recording private calls/DMs.
- Publishing recordings with private data without permission.
Benchmark: up to ~2 years’ imprisonment in Nigeria; other regions vary.
E) False or Misleading Information (Section 19) — No intentional deception that causes harm
Allowed (examples)
- Clearly labeled satire/opinion.
- Honest mistakes corrected promptly with updates.
Not allowed on 6ix
- Investment, giveaway, or crypto scams.
- Deceptive content likely to cause public harm (fake emergencies, harmful medical claims).
Benchmark: up to ~2 years’ imprisonment in Nigeria; other regions vary.
F) Online Harassment & Abuse (Section 22) — No targeted harassment
Allowed (examples)
- Criticism of ideas or content without attacking protected characteristics.
- Using block/mute to manage interactions.
Not allowed on 6ix
- Threats, demeaning slurs, brigading or stalking.
- Doxxing (posting home addresses, IDs, non-public contacts).
Benchmark: up to ~2 years’ imprisonment in Nigeria; other regions vary.
G) Incitement of Ethnic/Religious Hatred (Section 24) — Zero tolerance
Allowed (examples)
- Contextualized reporting or academic discussion (no advocacy of harm).
- Supportive speech for inclusion and human rights.
Not allowed on 6ix
- Calls to violence against groups/communities.
- Dehumanizing content designed to provoke harm.
Benchmark: penalties may reach life imprisonment in Nigeria; other regions vary.
4) Administrator Duties (Rooms, Channels, Communities)
Back to topSet Clear Rules
Use Tools Proactively
Escalate When Needed
Accountability
5) Account & Device Safety
Back to topAuthentication
Session Hygiene
Device Security
Phishing & Social Engineering
6) Incident Response & Evidence Handling
Back to topIntake & Triage
Containment & Remediation
Evidence Preservation
User Communication
7) Fraud, Payments & Marketplace Integrity
Back to topProhibited Conduct
Signals & Holds
Verification (KYC/AML)
Advertising Integrity
8) Live Streams, Calls & Recording (Consent)
Back to topConsent Requirements
Safety Controls
Minors
Post-Event Handling
9) Reporting & Cooperation with Authorities
Back to topIn-App Reporting
Emergency Situations
Lawful Process
User Notice
10) Regional Notes & Global Application
Back to topNigeria Reference
Other Jurisdictions
Strictest Standard Wins
11) FAQ (Plain Language)
Back to topDoes 6ix record my conversations by default?
Can I post leaked passwords if they’re already public elsewhere?
What if I’m doxxed on 6ix?
Are admins responsible for everything users post in their rooms?
Do you share data with authorities?
12) Definitions & Practical Examples
Back to topUnauthorized access
Using someone’s account/device without permission (e.g., stolen password, token hijack, session fixation).
Examples
- Logging into an influencer’s account using leaked credentials.
- Hijacking a session cookie from a public computer.
Data tampering
Altering/destroying data you don’t control (e.g., deleting others’ content via exploit, corrupting chat archives).
Examples
- Injecting scripts to wipe a rival’s stream comments.
- Using stolen admin credentials to purge evidence.
Critical information
Sensitive infrastructure details where exposure could endanger public safety or enable serious compromise.
Examples
- Publishing private keys or emergency override codes.
- Dumping detailed exploit steps targeting critical systems.
Private conversation
Non-public call/room/DM with a reasonable expectation of privacy.
Examples
- Locked team room with invite-only access.
- 1:1 call with recording disabled.
Incitement
Expressions that encourage violence or hatred against protected groups or communities.
Examples
- Calls to attack a group at a particular time/place.
- Dehumanizing language that advocates harm.
13) 6ix Enforcement Actions & Appeals
Back to topGraduated Response
Zero-Tolerance Areas
Appeals
Repeat Violations
14) Related 6ix Policies
Back to top15) Updates & Versioning
Back to topWe may update this notice as laws evolve or product features change. For material updates, we’ll provide reasonable notice (e.g., in-app or email). Continued use after the effective date constitutes acceptance.
16) Contact
Back to topSafety & Abuse
- Email: safety@6ixapp.com
- Use in-app reporting for fastest review
- Include links, timestamps, and screenshots
Legal & Privacy
- Legal: legal@6ixapp.com
- Privacy: privacy@6ixapp.com
- Security: security@6ixapp.com
For additional information, review our Privacy Policy, Law Enforcement Guidelines, and Transparency Report (when available).