Acceptable Use Policy
Activities and content that are not permitted on ADE — high-risk uses, abuse prevention, enforcement.
ADE Acceptable Use Policy
ADE is intended to support legitimate business activity. We want the Service to be useful, safe, and professionally reliable for customers and for the people affected by its use. This Acceptable Use Policy explains uses that are not permitted.
This Policy is incorporated into the ADE Terms and Conditions and forms an integral part of your agreement with Autonomous Digital.
1. General Rule
You may use the Service only for lawful, authorized, and responsible business purposes. You may not use the Service in any way that violates law, infringes the rights of others, creates a material safety or security risk, undermines the integrity of the Service, or is inconsistent with the intended purpose of the Service, including, without limitation, the activities described in Section 2 below.
2. High-Risk, Harmful, and Prohibited Uses
Unless Autonomous Digital expressly authorizes it in writing, you may not use the Service for, in connection with, or to support any of the following:
A. Operational Military, Weapons, and Intelligence Activities
- operational military activities,
- defense, combat, targeting, battlefield support, or weapons-related activities,
- intelligence collection, intelligence analysis, surveillance for intelligence purposes, or covert operations,
- development, manufacture, acquisition, procurement, distribution, servicing, or use of weapons, munitions, explosives, firearms, missile systems, CBRNE-related systems, or weapons components,
- operational support for armed conflict or paramilitary activity.
B. Illegal Goods, Services, and Criminal Activity
- illegal drugs, controlled substances, drug production, trafficking, distribution, or concealment,
- prostitution facilitation, sex trafficking, labor trafficking, human trafficking, or exploitation,
- organized crime,
- money laundering, sanctions evasion, bribery, corruption, or fraud,
- identity theft, impersonation, forgery, document fraud, or deceptive schemes,
- illegal gambling,
- facilitation of criminal planning or unlawful evasion of law enforcement.
C. Harm to People, Property, or Public Safety
- terrorism, extremist violence, threats, harassment, incitement, or violent wrongdoing,
- instructions for weapons use, explosives, sabotage, or physical harm,
- deployment as a primary decision-making or control system in contexts where failure could reasonably result in death, bodily injury, major property damage, or public safety incidents, unless expressly approved by ADE in writing and supported by additional contractual terms.
D. Cyber Abuse and Security Violations
- malware, ransomware, spyware, credential theft, phishing, botnets, denial-of-service attacks, or unauthorized intrusion,
- vulnerability exploitation, circumvention of security controls, or unauthorized access to systems, devices, networks, or data,
- abusive scraping or extraction in violation of law or contract,
- attempts to defeat, bypass, or probe ADE's safety controls, monitoring, access controls, or service restrictions.
E. Regulated Advice Without Proper Oversight
- use of the Service as a primary source for legal, medical, tax, accounting, investment, employment, safety, or other regulated or licensed advice without appropriate human review or oversight,
- fully automated decisions that determine an individual's legal rights, medical care, employment, credit, insurance, housing, or comparable high-impact outcomes without appropriate human oversight and legal compliance.
F. Abuse, Deception, and Misrepresentation
- impersonating another person or entity,
- falsely representing outputs as independently human-generated where disclosure is required,
- deceptive outreach, spam, scams, or manipulative communications,
- generating or distributing false, defamatory, or misleading material in violation of law,
- using the Service in a way that is deceptive, coercive, exploitative, abusive, or otherwise unlawful.
G. Rights Violations and Sensitive Data Abuse
- infringement or misappropriation of intellectual property, privacy, publicity, confidentiality, or other rights,
- processing personal data in violation of applicable privacy or data protection law,
- collection or use of highly sensitive data without appropriate legal basis, notice, consent, security, and authorization.
3. Service Integrity Restrictions
You may not:
- reverse engineer, decompile, disassemble, or attempt to derive source code from the Service except where prohibited by law,
- resell, sublicense, distribute, or commercially exploit the Service except as expressly authorized in writing by Autonomous Digital,
- use the Service to build or train a competing product based on unauthorized copying, extraction, or systematic use of the Service,
- interfere with or disrupt the operation, security, performance, or stability of the Service,
- use the Service in a way that exceeds usage limits or avoids fees,
- misuse login credentials, phone numbers, integrations, channels, or identity systems connected to the Service.
4. Customer Responsibility for End Users and Configurations
You are responsible for the conduct of your users, administrators, employees, contractors, end users, and for any workflows, automations, prompts, integrations, or channels you configure, enable, or authorize. You must implement appropriate internal controls, permissions, and review processes for your use case. You are also responsible for determining and implementing any legally required disclosure, notice, labeling, identification, or transparency measure relating to the use of artificial intelligence, automation, or digital employee functionality in your communications, workflows, and channels, as more fully set forth in the ADE Terms and Conditions.
5. Enforcement
We prefer to address concerns proportionately and in good faith where possible. However, if we reasonably believe that your use of the Service creates legal exposure, safety concerns, abuse risk, policy violations, operational harm, or reputational harm, Autonomous Digital may investigate, limit, suspend, or terminate access where reasonably necessary to protect the Service, customers, third parties, or the public.
Autonomous Digital may also remove content, disable workflows, restrict integrations, block users, or take other protective action if we reasonably believe it is necessary to protect the Service, our customers, third parties, or the public.
6. Reporting
If you become aware of misuse, unlawful activity, harmful activity, or a security issue involving the Service, please promptly notify Autonomous Digital at ADE@mydigitalemployee.ai or call us at +1 (713) 575-3929.
7. Updates
We may update this Policy as the Service evolves, legal requirements change, or new misuse patterns emerge. If we make a material update, we will provide notice in a commercially reasonable manner, such as by posting the updated Policy on our website, within the Service, or by email. Continued use of the Service after the updated Policy becomes effective constitutes acceptance of the updated Policy.
Need help?
Email ADE@mydigitalemployee.ai or call +1 (713) 575-3929.
22136 Westheimer Parkway #602, Katy, TX 77450, USA