1. Our policy
CD4CD does not allow:
- Links impersonating a brand the user doesn't own.
- Bio pages using a brand's name or logo without authorization.
- QR codes claiming to represent government or banking entities without authority.
- Aliases that mimic well-known brands (e.g.,
noon,stcpay,alrajhi).
2. 6 protection layers on every link
- Reserved-word list: 2,400+ terms, updated weekly.
- Domain blocklist: 45,000+ known phishing domains.
- Brand-impersonation check: fuzzy matching against major KSA + GCC brands.
- Google Web Risk API: URL hash lookup against Google's database.
- AI Safety Check (Llama Guard 3): content safety analysis.
- Rate-limiting + honeypot: bot abuse prevention.
3. How to report
For fast-track removal follow this format:
- Email [email protected] with subject "Trademark Takedown".
- Attach trademark registration proof (TM certificate or commercial register).
- The offending link / QR / Bio page.
- Short description of potential harm.
For live, active fraud cases, contact [email protected] with "URGENT" in the subject.
4. Response SLA
- Initial review: within 4 working hours.
- Full takedown: within 24 hours of confirmed evidence.
- Counter-notice from accused user: 48 hours to appeal, then final decision.
5. Pre-protected brands
The following are reserved by default (cannot be used as an alias from any unauthorized account):
- Government: absher, nafath, tawakkalna, gov.sa.
- Saudi banks: alrajhi, snb, albilad, alinma, riyadbank.
- Digital payments: stcpay, mada, moyasar, tabby, tamara.
- E-commerce: noon, amazon, jarir, extra, saco.
- Saudi platforms: salla, zid, haraj, wadi, saudi-airlines.
If your brand wants on the protected list, email [email protected].