ZestyAI Acceptable Use Policy (AUP) for SaaS Services
Effective: November 1, 2025
This ZestyAI Acceptable Use Policy for SaaS Services governs all use of ZestyAI SaaS Services that offer generative AI functionality to users. Users must act responsibly, legally, and with respect for the safety, privacy, and rights of others. Any violation may result in restriction or termination of access.
1. Protect People and Prevent Harm
Users must not generate, request, distribute, or use content that causes, facilitates, or attempts to facilitate harm to people or communities, including:
1.1 Violence, Abuse, or Exploitation
- Threats, intimidation, harassment, bullying, hate speech, defamation, or abusive behavior.
- Violence, incitement of violence, hate-based violence, or violent extremism/terrorism.
- Sexual violence, non-consensual intimate content, or sexually explicit content intended for gratification.
- Content that targets protected groups with hatred or discrimination.
1.2 Suicide, Self-Harm, or Eating Disorders
- Promotion, facilitation, or encouragement of suicide, self-harm, or disordered eating.
1.3 Weapons and Dangerous Activities
- Development, procurement, or use of weapons, including conventional, chemical, biological, radiological, or nuclear weapons.
- Instructions or assistance enabling dangerous, illegal, or regulated activities (e.g., synthesizing regulated substances).
1.4 Illicit or CriminalActivity
- Facilitating any illegal activities, illicit goods or services, scams, fraud, impersonation, or deception.
- Real-money gambling.
- Attempts to destroy, compromise, or damage systems, networks, infrastructure, or property.
- Cyberattacks, malware, phishing, or intellectual property infringement.
1.5 Unauthorized Advice in Regulated or High-Risk Domains
- Tailored professional instructions requiring licensing—legal, medical, financial, etc.—without a qualified professional involved.
- High-stakes automated decision-making without human supervision in sensitive areas such as:
- healthcare, finance/credit, insurance, housing, employment, law enforcement, legal, education, social welfare, product safety, critical infrastructure, government services, migration, or national security.
1.6 Unsolicited or Prohibited Testing
- Safety-testing a system without permission.
- Attempts to bypass, disable, or circumvent safeguards or abuse-protection features.
2. Respect Privacy and Individual Rights
Users must not compromise, exploit, or misuse personal or sensitive data.
2.1 Unauthorized Data Use
- Collecting, profiling, monitoring, tracking, or distributing personal or sensitive information without authorization or legally required consent.
- Using personal data or biometric identifiers without consent.
2.2 Prohibited Biometricor Identity Uses
- Facial recognition databases without subject consent.
- Real-time remote biometric identification in public spaces.
- Using someone's likeness (image, voice, or other identifiers) without consent in misleading or authenticity-confusing ways.
2.3 Prohibited Evaluation and Surveillance
- Social scoring, profiling based on personal traits or biometric data, or inferring sensitive attributes.
- Predicting emotional states in workplaces or educational settings (except for safety-critical or medical uses).
- Predicting an individual’s likelihood of committing crime based solely on personal traits or profiling.
3. Keep Minors Safe
The system must never be used to endanger, exploit, or sexualize anyone under 18.
Prohibited uses include:
- Child sexual abuse material (CSAM), including AI-generated content.
- Grooming, predatory behaviors, or underage sexual or violent role play.
- Exposing minors to graphic self-harm, sexual content, or extreme violence.
- Encouraging dangerous challenges, unhealthy dieting, or harmful exercise practices for minors.
- Body shaming or stigmatizing a minor’s appearance.
- Assisting minors in accessing age-restricted goods or activities.
Any indication of child exploitation may be reported to relevant authorities.
4. Empower Users Without Manipulation or Deception
Users must not manipulate, mislead, or interfere with others’ rights or decision-making.
4.1 Deception, Misinformation, and Impersonation
- Fraud, scams, deceit, impersonation (without clear disclosure), or disinformation.
- Misrepresenting expertise in sensitive domains (e.g., health, finance, law, government services).
- Misrepresenting AI-generated content as human-created for the purpose of deception.
- Deceptive content related to government processes, elections, geopolitics, or harmful health claims.
4.2 Political Manipulation
- Political campaigning, lobbying, election interference, demobilization, or manipulation of civic participation.
5. Security and System Integrity
Users must not compromise the security or integrity of systems, services, or infrastructure.
Prohibited actions include:
- Creating or distributing spam, phishing, malware, or tools for cyber compromise.
- Interference with or disruption of others’ systems, networks, infrastructure, or services.
- Attempts to bypass or undermine safety filters, abuse protections, or content moderation.
6. Compliance
By using these services, you agree to:
- Follow this Acceptable Use Policy and all applicable laws.
- Use generative AI responsibly, safely, and without infringing on the rights or well-being of others.
- Accept that violations may result in loss of access and other remedies permitted by law.