API Terms of Use

Last updated: February 14, 2026

These terms govern your use of the MIR Assertions API as an issuer. By using the API, you agree to these terms and commit to creating assertions honestly and in accordance with the MIRA Constitution.

1. Definitions

"MIRA" refers to MIR Assertions, a cryptographic provenance registry for digital media, operated by phpMyDEV, LLC.

"Issuer" refers to any organization or individual approved to create assertions via the MIRA API or Issuer Portal.

"Assertion" refers to a cryptographically signed statement about a digital artifact (e.g., ISSUED_BY, NOT_ISSUED_BY, LICENSED_TO, DISPUTE).

"Artifact" refers to a digital media file identified by its SHA-256 hash.

"API" refers to the MIRA application programming interface and related services.

"Issuer Key" refers to a cryptographic signing key registered to an issuer for signing assertions.

2. API Access

2.1 Registration

To use the API, you must apply as an issuer and receive approval. Registration requires accurate information about your organization and intended use case.

2.2 API Keys

Your API key is confidential. You must:

2.3 Issuer Keys

Cryptographic signing keys must be managed responsibly. You must:

2.4 Rate Limits

API access is subject to rate limits. Default limits are 60 requests per minute for general endpoints and 30 requests per minute for batch operations. Issuers also have a daily assertion limit (default: 10) that may be increased upon verification. Exceeding limits may result in temporary throttling.

3. Acceptable Use

Core Principle: MIRA records who made each assertion. MIRA does not verify whether any assertion is true, justified, or authoritative. You are solely responsible for the accuracy of your assertions.

3.1 Permitted Uses

You may use the API to:

3.2 Prohibited Uses

You must NOT use the API to:

4. Data Handling

4.1 Assertion Permanence

Assertions are part of a public, auditable record. Once created, an assertion cannot be deleted — only revoked or superseded. Revoked assertions remain visible as revoked. You should understand this permanence before creating assertions.

4.2 Privacy Obligations

When handling assertion data, you must:

4.3 Cached Data Retention

You may temporarily cache MIRA lookup responses to support your product functionality. Cached data should be refreshed regularly as assertions may be revoked or superseded. You must delete all cached MIRA data upon termination of your issuer account.

Important: Creating false assertions is grounds for immediate account suspension. Repeated violations may result in permanent revocation of issuer status.

5. Issuer Responsibilities

As an issuer, you acknowledge and agree that:

6. Security Requirements

You must implement reasonable security measures including:

You must notify MIRA within 48 hours of discovering any security incident involving your issuer keys or API credentials.

7. Service Availability

MIRA strives for high availability but does not guarantee uninterrupted service. We may:

8. Termination

8.1 By You

You may cease using the API at any time. Your existing assertions remain in the public record. You must delete all cached MIRA data and revoke any active issuer keys.

8.2 By MIRA

We may suspend or terminate your access:

Issuer status changes are logged in the public audit trail as required by the MIRA Constitution.

9. Liability

MIRA provides assertion registry services "as is" without warranty. We are not liable for:

MIRA does not assess the truth or legality of assertions. We record who asserted what, not whether it is correct.

Your use of MIRA is at your own risk. You agree to indemnify MIRA against claims arising from your use of the API or assertions you create.

10. Changes to Terms

We may update these terms with notice. Continued use after changes take effect constitutes acceptance. Material changes will be communicated via email to registered issuers.

11. Contact

For questions about these terms:

12. Governing Law

These terms are governed by the laws of the State of Arizona, without regard to conflict of law principles.

Summary: Create assertions honestly. Protect your keys. Don't impersonate others or file bad-faith disputes. Respect the permanence of the public record. When in doubt, ask.