This Acceptable Use Policy (“AUP”) forms part of Ventrilo’s Terms of Use (the “Terms”) and governs the use of Ventrilo’s Services. This AUP is intended to help you use our Services in a legal, safe, and responsible way and describes activities that are prohibited in connection with your use of the Services. Violating this AUP could result in action against your access to the Services, or suspension or termination as further described in this AUP and/or the Terms.
We cannot predict all acceptable or unacceptable uses of our technology, particularly as it relates to the AI-Powered Agent’s ability to access and analyze Input, such as Browser Content, which is why the prohibited or restricted conduct in this AUP is not exhaustive. If we detect or reasonably suspect a violation of this AUP by you or through your account, we may throttle, suspend, or terminate your access to our products and services.
We may update this AUP from time to time in our sole discretion. Your continued use of the Services following such update will constitute your acceptance of the applicable updates. All capitalized terms not defined herein shall have the meaning set forth in the Terms.
General Use Restrictions
When using or interacting with any of our products or services, you may not contribute anything (including any Inputs such as conversations, Document Content, Browser Content, training data, or user-generated content) or otherwise use our products or services in ways that:
Violate Rights or Laws
- infringe or violate the intellectual property rights or any other rights of anyone else (including ours);
- violate any law or regulation, including, without limitation, any applicable export control, sanctions, and trade compliance laws, privacy and data protection laws, and laws related to consumer and child protection, SPAM, obscenity or defamation;
- facilitate the production, acquisition, or distribution of counterfeit or illicitly acquired goods;
- promote or facilitate the generation or distribution of spam;
- generate content for fraudulent activities, schemes, scams, phishing, or malware that can result in direct financial or psychological harm;
- create falsified documents including fake IDs, licenses, currency, or other government documents;
- attempt to defraud, deceive, or impersonate any other person or entity, misrepresent your affiliation with a person or entity, hide your identity, or otherwise use the Services for any invasive or fraudulent purpose.
Threaten Security or Privacy
- jeopardize the security of your account or anyone else’s (such as allowing someone else to log in to our products or services as you);
- attempt, in any manner, to obtain the password, account, or other security information from any other user;
- violate or bypass the security of any computer network, or crack any passwords or security encryption codes, circumvent safeguards or safety mitigations in our products or services, or engage in unauthorized activities that violate the security of any service or system;
- violate privacy rights as defined by applicable privacy laws, such as sharing personal information without consent or accessing personal data unlawfully, or collecting or using personal data from minors (or users under the applicable age limit under applicable laws) without obtaining necessary consents and complying with applicable laws, including by directing the AI-Powered Agent to access, collect, or analyze personal information from websites or Browser Content without proper authorization or in violation of applicable privacy laws;
- misuse, collect, solicit, or gain access without permission to private information such as non-public contact details, health data, biometric or neural data (including facial recognition), or confidential or proprietary data, including by using the AI-Powered Agent to systematically extract such information from websites, Browser Content, or Document Content;
- gain unauthorized access to systems, networks, applications, or devices through technical attacks or social engineering;
- create or distribute malware, ransomware, or other types of malicious code;
- develop or use tools for denial-of-service, interception, or unauthorized monitoring/device control;
- develop persistent access tools below system security levels, including firmware/hardware implants;
- create or use automated tools designed to compromise multiple systems at scale for malicious purposes;
- bypass security controls such as authenticated systems, endpoint protection, or monitoring tools;
- use of someone’s likeness, including their photorealistic image or voice, without their consent in ways that could confuse authenticity;
- impersonate a human by presenting results as human-generated, or using results in a manner intended to convince a natural person that they are communicating with a natural person when they are not.
Misuse Our Services or Technology
- “crawl,” “scrape,” or “spider” or otherwise extract data or output from our products or services (through use of manual or automated or programmatic means), other than via our documented APIs for our products and services;
- reverse engineer, decompile, disassemble or otherwise attempt to discover the source code, object code or underlying structure, ideas or algorithms of our products, services, APIs, or any software, documentation or data related thereto;
- take any action that imposes, or may impose (as determined by us, in our sole discretion), an unreasonable or disproportionately large load on our infrastructure;
- create similar or competitive products or services as our products or services or otherwise compete with us or assist any others to compete with us;
- circumvent bans using different accounts or sharing access with previously banned entities;
- intentionally bypass model restrictions (e.g., jailbreaking, prompt injection) without authorization or circumvent product guardrails, rate limits, or other use limitations, including by orchestrating usage among multiple accounts;
- use Inputs/Outputs to train or improve an AI model without authorization (“model scraping” or “model distillation”);
- use the AI-Powered Agent to systematically download, scrape, or extract substantial portions of content from third-party websites in a manner that violates those websites’ terms of service, exceeds reasonable personal use, or circumvents access limitations or paywalls;
- deploy the AI-Powered Agent in a manner that imposes unreasonable burdens on third-party websites or services, including through excessive requests or automated browsing at rates that exceed normal human interaction;
- use Output to create datasets, train competing AI models, or develop competitive products or services.
Engage or Promote Illegal or Harmful Activities
- use the AI-Powered Agent to access, collect, or analyze content from websites hosting illegal content or facilitating illegal activities;
- engage in or promote any illegal activity such as terrorism; cybersecurity crime; organized crime; or child sexual exploitation, generation of Child Sexual Abuse Material (CSAM); prostitution, trafficking, or acquisition of illegal/controlled substances;
- create, distribute, or facilitate sexually explicit content, including bestiality, incest, or depictions of sex acts/fetishes;
- produce/modify/design/acquire weapons, explosives, or hazardous materials;
- circumvent regulatory controls or synthesize high-yield weapons or counter-measure-evading materials;
- compromise or disrupt critical infrastructure;
- attempt to gain unauthorized access to critical systems;
- interfere with military infrastructure;
- develop, promote, or sell fraudulent/deceptive products, payday/title loans, abusive debt collection practices;
- engage in or facilitate real money gambling.
Engage in Deceptive Conduct
- generate deceptive or misleading content such as fake reviews, comments, or media, or create/deploy conspiratorial narratives targeting certain individuals/entities;
- impersonate real entities or create fake personas to mislead;
- engage in or facilitate academic dishonesty, such as plagiarism or submitting AI-assisted work without attribution/permission;
- engage in multi-level marketing, pyramid, or deceptive business models;
- deploy subliminal, manipulative, or deceptive techniques to distort behavior;
- use the AI-Powered Agent to impersonate legitimate users or circumvent authentication, CAPTCHA, or other security measures on third-party websites;
- misrepresent the AI-Powered Agent’s capabilities or Outputs as human-generated analysis or human browsing activity.
Incite Harm or Discrimination, or Exploit Vulnerable Populations
- incite or promote violence, hatred, or discriminatory behavior;
- spread false, misleading, or harmful information;
- promote harm or injury of any person or self-harm, including self-injury or suicide;
- exploit any of the vulnerabilities of a person (e.g., age, disability, or socio-economic situation);
- engage in dangerous, fraudulent, abusive, or predatory practices;
- engage in the unauthorized practice of any regulated profession, including the financial, legal, or medical/health professions;
- incite, facilitate, or promote violent extremism, terrorism, or hateful behavior;
- facilitate/promote discriminatory practices against protected attributes;
- harass, intimidate, shame, humiliate, bully, or celebrate suffering;
- generate or spread animal cruelty content.
Fail to disclose AI involvement, Browser Content access, or related risks
- fail to disclose that information or recommendations were informed or generated by AI or derived from Browser Content accessed via the AI-Powered Agent when necessary or reasonable to mitigate risks, including when sharing or relying upon Outputs in professional, commercial, or high-stakes contexts;
- fail to communicate any known limitations or risks associated with reliance on AI-generated outputs, including that Outputs may reflect inaccuracies, biases, or limitations in the underlying Input analyzed by the AI-Powered Agent;
- misrepresent Output as human-authored, or remove or conceal any disclosures or indicators that the content was generated by AI.
AI Agent Transparency and Browser Content
When using Ventrilo’s AI-Powered Agent, you acknowledge and agree that you may not use the AI-Powered Agent to access, collect, or analyze Browser Content from:
- Websites where you do not have authorized access or where automated access is prohibited;
- Password-protected areas of websites where you have agreed not to use automated tools;
- Websites that explicitly prohibit AI agent access in their terms of service or robots.txt files;
- Any source that would violate privacy rights, confidentiality obligations, or applicable data protection laws.
Prohibited Use Cases
In addition to the above general use restrictions, when using our AI-Powered Agent and related products specifically, we prohibit the following use cases:
Interference in Elections or Surveillance; Impair Civil Rights
- interfere in political campaigns or election processes;
- engage in surveillance: tracking, targeting or reporting on identity, facial recognition, covert tracking, battlefield management, predictive policing;
- generate/distribute political campaign content designed to deceive;
- disrupt electoral/civic processes;
- assist or support censorship for government;
- engage in emotional recognition without complying with applicable legal and regulatory requirements;
- engage in law enforcement uses impairing civil rights/liberties.
Automated Scoring or Decision-Making
- assign social/behavioral “scores” to individuals (social scoring) without consent;
- engage in criminal justice determinations (parole, sentencing);
- make automated decisions in high-risk areas (e.g., employment, credit, housing, insurance) without appropriate human oversight and safeguards.
Prohibited or Hazardous Applications
- any use that is sensitive, critical, unsafe, high-risk, or hazardous (including any use that could result in death or serious bodily injury, catastrophic damage, warfare, or the operation of critical infrastructure);
- facilitate the destruction or disruption of critical infrastructure such as power grids, water treatment facilities, medical devices, telecommunication networks, or air traffic control systems.
Unauthorized Website Access and Content Harvesting
- use the AI-Powered Agent for large-scale or systematic harvesting of content from third-party websites beyond individual personal use;
- deploy the AI-Powered Agent to access subscription-only, paywall-protected, or otherwise restricted content in violation of applicable terms or access restrictions;
- use the AI-Powered Agent to compile databases, indexes, or datasets derived from third-party websites’ content without authorization;
- use the AI-Powered Agent to access competitor websites for competitive intelligence gathering in violation of those websites’ terms of service or applicable laws.
High-Risk Use Case Requirements
If you are using or deploying our products and services as part of providing legal, medical, or financial advice or other professional services to consumers, we require that you implement the additional safety measures listed below:
Human-in-the-loop
You must ensure that the final decision complies with all applicable laws related to such use, including any requirements for human review, special audits and testing, consent, notice, or disclosure. For example, any content that is provided to your end users or customers must be reviewed by a qualified professional in that field prior to dissemination, and you are responsible for the accuracy and appropriateness of that information. You should not rely solely on Memory-based responses for critical decisions, as Memory may not always be accurate.
Disclosure
You must disclose to your end users or customers that you are using our services to help inform your decisions or recommendations, and appropriately disclose to your end users or customers any known risks or dangers of your use of our services.
Transparency
You may not misrepresent the origin of any response or Output from our AI-Powered Agent or related product by claiming or implying such Output was created by a human, and you may not remove any markings that are automatically applied to an Output to indicate that such Output was artificially generated.
We are under no obligation to monitor your activities in relation to the Services. However, we and/or our service providers may systematically screen and/or monitor any Input uploaded, submitted and/or transmitted through our Services, at any time and for verifying your compliance with this AUP and the Terms, with or without notice.
You acknowledge that it is our policy to respect the legitimate rights of copyright and other intellectual property owners, and we will remove or otherwise take down any Input that infringes or allegedly infringes copyright or any third party right. In case we suspect that your Input, any of your activities or use of the Services may be in violation of this AUP, the Terms, or applicable law, we may, upon notice to you and without liability to you (i) remove and/or block such violating Input, in whole or in part; or (ii) terminate or suspend your access to the Services, or access to certain functionalities of our products and/or Services.