Legal
Acceptable Use Policy
Effective date: March 28, 2026
Last updated: March 28, 2026
1. Overview
This Acceptable Use Policy ("AUP") defines the boundaries of permitted behavior on the HumanikOS platform. It applies to all users, accounts, workspaces, offices, and AI agents operating within the Service.
This policy is incorporated by reference into our Terms of Service. Violation of this policy may result in warning, suspension, or termination of your account, as described in the Enforcement section below.
HumanikOS provides powerful tools — isolated compute environments, AI agents with real code execution, data infrastructure, and third-party integrations. With that power comes responsibility. You are accountable for all activity conducted through your account, including actions taken by AI agents you deploy.
2. Illegal & Harmful Use
You may not use the Service to:
- Violate any applicable law, regulation, or legal obligation
- Engage in fraud, money laundering, or financing of illegal activities
- Harass, threaten, stalk, intimidate, or bully any individual
- Distribute, store, or generate child sexual abuse material (CSAM) — this is a zero-tolerance violation resulting in immediate termination and law enforcement referral
- Facilitate human trafficking, exploitation, or forced labor
- Support terrorism or incite violence against any person or group
- Violate the intellectual property rights of others
- Invade the privacy of others, including collecting or disclosing personal information without authorization
3. AI-Specific Prohibitions
AI agents on HumanikOS operate in real environments with real consequences. The following uses of AI features are prohibited:
Deceptive & Manipulative Use
- Generating deepfakes, synthetic media, or other content intended to deceive or mislead
- Creating disinformation, fake reviews, or misleading content at scale
- Automated impersonation — representing AI agents as human in contexts where disclosure is legally or ethically required
- Using AI to manipulate, exploit, or deceive individuals through social engineering
Unauthorized Access & Exploitation
- Using AI agents to perform unauthorized access, scanning, or exploitation of third-party systems
- Deploying AI agents to circumvent security controls, authentication mechanisms, or access restrictions on any system
- Developing malware, ransomware, exploit kits, or other offensive tools using the platform
- Automated credential stuffing, brute-force attacks, or vulnerability scanning against systems you do not own or have authorization to test
Spam & Abuse
- Mass generation of spam, phishing emails, or unsolicited communications
- Automated creation of fake accounts on third-party platforms
- Using AI agents to flood, disrupt, or degrade any service — including HumanikOS itself
High-Risk Automated Decisions
- Using AI agents to make fully automated decisions with legal or significant effects on individuals — including employment, credit, housing, insurance, or law enforcement — without meaningful human oversight
- Social scoring or categorizing individuals based on social behavior or predicted personal characteristics
- Real-time biometric identification in publicly accessible spaces
Intellectual Property Abuse
- Systematically generating content that reproduces copyrighted material at scale
- Training or fine-tuning external AI models using outputs generated on the platform without compliance with applicable laws
4. Platform Abuse
You may not:
- Attempt to circumvent billing, usage limits, rate controls, or resource quotas
- Use platform compute resources for cryptomining, torrent seeding, or other unauthorized workloads
- Launch denial-of-service attacks against the platform or use the platform to attack others
- Access or attempt to access other tenants' data, workspaces, offices, or accounts
- Reverse-engineer, decompile, disassemble, or extract the source code of the platform
- Scrape, crawl, or systematically extract data from the platform beyond what is provided through our APIs
- Resell, sublicense, or redistribute access to the Service without written authorization
- Interfere with or degrade the Service for other users through excessive or abusive usage patterns
- Attempt to bypass, disable, or tamper with security features, monitoring, or audit controls
5. Content Restrictions
You may not use the Service to store, distribute, or generate:
- Malware, viruses, ransomware, or any malicious software
- Pirated content or content that infringes intellectual property rights
- Content that promotes or facilitates illegal drug transactions
- Non-consensual intimate imagery or sexually explicit content involving minors
- Content that promotes self-harm, suicide, or eating disorders
- Extremist or terrorist propaganda, including material that recruits for or glorifies violent extremism
6. Integration Abuse
When using platform integrations (Telegram bridge, external APIs, webhooks, or other third-party connections), you must:
- Comply with the terms of service of all connected third-party platforms
- Not use integrations to spam, flood, or abuse third-party services
- Not use the Telegram bridge to send unsolicited messages, phishing links, or automated spam to users or groups
- Not exfiltrate data from third-party services in violation of their terms
- Not use integrations to circumvent restrictions or bans imposed by third-party platforms
7. Enforcement
We enforce this policy through a graduated response appropriate to the severity of the violation:
Warning
For minor or first-time violations. You will receive written notice of the violation and a 7-day period to correct the behavior.
Suspension
For repeated or serious violations. Your account and all associated offices will be suspended pending review. You will be notified and given the opportunity to respond.
Termination
For severe violations — including illegal activity, CSAM, security attacks, or any activity that poses imminent harm. Termination is immediate with no cure period. Remaining credits are forfeited per the Terms of Service.
Law Enforcement Referral
Where legally required or where activity poses imminent harm to any person, we will report violations to the appropriate law enforcement authorities.
We reserve the right to take any action we deem necessary to protect the safety and integrity of the Service and its users, including removing content, disabling offices, or restricting access without prior notice in cases of imminent harm.
8. Reporting Violations
If you become aware of a violation of this policy, please report it to info@humanik.io. Include as much detail as possible, including the nature of the violation and any relevant identifiers (workspace, office, or account information).
We will investigate reports within 5 business days. The identity of the reporter will be kept confidential to the extent permitted by law.
9. Changes to This Policy
We may update this Acceptable Use Policy from time to time. We will notify you of material changes at least 30 days in advance via email or a notice within the platform. Your continued use of the Service after the updated policy takes effect constitutes your acceptance of the changes.
Contact
If you have questions about this policy, contact us at:
Humanik Technologies Inc.
Email: info@humanik.io
Website: humanik.io