Acceptable Usage Guidelines


Effective Date: May 31, 2024

Overview

Here at 1mind, our goal is to provide intelligent AI for sales and customer success teams. Security and privacy are at the core of our technology. We create meaningful connections while safeguarding sensitive data and utilizing best practice data privacy measures including formal compliance protocols. 

In order to do this, we need to work to ensure our systems and services are running efficaciously. To make this happen, we need help from you, our customers and end users, to ensure that our products and services are not abused or misused inappropriately.

First and foremost, deploying AI at scale comes with many challenges and responsibilities. Here is a simple overview of guidelines to follow:

  • Treat AI with respect, like you would a human being

  • Be constructive, generous, and kind

  • Respect divergent views

  • Be professional and use common sense

  • Do not impersonate other people

Please note, our platform allows you or your AI to engage only with users you want you and your AI to engage with. At any time, you can change your preferences on these types of interactions by updating your privacy settings.

To lay out these definitions and these specific prohibited activities more clearly, we've established the Acceptable Usage Guidelines that we require as part of your acceptance to our Terms of Use. With this policy, please keep in mind that these are guidelines, and we cannot possibly provide a comprehensive list of everything that would be unacceptable.  Please use common sense and be courteous. If something crosses over into the realm of what we deem to be unacceptable, we may take appropriate action.

Use your judgment, and let’s be kind to each other so we can keep creating great things. Please keep in mind that we can remove you from the platform at any time.

You can find the detailed fine print further down this page. More generally, here is what we will not allow:

  1. Illegal or Wrongful Activities

  2. Disruption, Security Violations, or Network Abuse

  3. No Email or Other Communications Abuse

Illegal or Wrongful Activities

We can not possibly define all illegal or wrongful activities that could violate laws in all jurisdictions and also our Acceptable Usage Guidelines as the list would be so extensive, it would merit publishing into a multi-part book series. All joking aside, here are some of the overarching themes of prohibited activities we will not permit:

  • No using our services in violation of any laws in your jurisdiction nor for any illegal purpose.

    • Violating the rights of others, activities that are illegal such as facilitating or promoting or engaging in child pornography, rape, human trafficking, terrorism, torture or murder, hate speech, racism, libel, slander, defamation, extortion, etc. These types of content will be removed and reported to appropriate law enforcement agencies when applicable.

  • No misrepresenting yourself or disguising the origin of any content for the purpose of “phishing” or “spoofing”, hacking of any kind, extortion, stalking, anything deemed illegal, etc.

  • Using our services to violate the privacy of anyone in any manner such as  capturing, gathering, or collecting other people’s personal information from our services.

    • Any means of “scraping” or accessing or searching our services to capture, gather, or collect other personal information from our system is not permitted.

    • No posting or publishing any other individual's confidential and private information without their express written permission.

  • Content that infringes on the intellectual property rights of others including trademarks, copyrights, patents, trade secrets, privacy rights, rights of publicity or any other type of proprietary or intellectual property is not permitted.

  • No harmful computer technology content that can interfere with or damage systems, data, or programs such as viruses, malware, worms, bots, scripts, exploits, Trojan horses, or other similar materials.

Disruption, Security Violations, or Network Abuse 

Any attempt to disrupt or violate our systems the integrity of any network in any manner would constitute abuse.

A “system” can mean anything from a software application to communications system to data to computing or network devices. Abuse could come in the form of compromising the integrity of our systems via any of the following, but not limited to:

  • Unauthorized access without permission including attempting scanning, probing, deciphering server transmissions, monitoring data, any reverse-engineering or hacking attempts of our services to circumvent any authentication or security measures such as breaching authentication systems or testing vulnerabilities on any network or systems within our services.

    • However, this does not apply to security based assessments that 1mind may regularly and expressly permit to bolster our system’s security.

  • No disabling, modifying or tampering with our systems nor compromising our services in any manner.

  • No attempting to overwhelm our infrastructure in any manner from applying an unreasonably large load to our systems that could consume extraordinary resources from GPUs, CPUs, memory, disk space, bandwidth, etc.

    • Usage of various automated systems to send massive number of requests via any method (eg. “spiders”, “robots,” etc.) to our servers that any human could not reasonably send in the same period of time.

    • Going beyond any sensible use of our services parameters and consuming an unreasonable amount of storage for content beyond what the services were designed for.

  • No network connections without explicit permissions to hosts, users, or networks related to any of the following, but not limited to prohibited activities such as crawling or monitoring systems that disrupt or impair the system in any way, Denial of Service (DoS or DDoS) or any intentional interference to overload the system via other flooding techniques, and no avoiding system restrictions to bypass set limitations on the system such as access and storage restrictions.

No Email or Other Communications Abuse

No unsolicited distribution of communications at any time. These can include any of the following items:

  • No publishing or sending, or facilitating in the sending of unsolicited communications, including but not limited to mass email, promotions, advertising, announcements, or general spam content using our services. 

  • No assuming of a sender’s identity nor altering or obscuring mail headers without the sender’s explicit permission.

  • No soliciting of our users for any commercial purpose without permitted exceptions by 1mind.

Monitoring and Enforcement

At our sole discretion and without affecting any other remedies available to us, 1mind may choose to temporarily or permanently suspend, or terminate a user’s access to our services or their specific account without any notice or liability if we, 1mind, determine the user has violated the Acceptable Usage Guidelines.

In this Acceptable Usage Guidelines, the term “content” can mean any of the following, but not limited to: 

  1. Any information within our system such as data, images, video, graphics, audio, music, text, messages, software, scripts, code, interactive features, tags, metrics, or any other materials that are uploaded, posted, submitted, shared, or otherwise provided in any other manner to our services.

  2. Any other data, content, or materials provided to 1mind or that are used within our Services.

Any activity that we suspect violates any law or regulation may be reported to the appropriate parties, such as law enforcement, regulators, officials, or any other third parties. In reporting these violations, the information provided may include disclosing relevant and appropriate customer information or content.

Depending on the specific violation, we may cooperate with the appropriate law enforcement, regulators, officials, or any other third parties to help with any investigation or prosecution of any illegal conduct by providing the relevant content for the alleged violation of this Acceptable Usage Guidelines.

Reporting of Violations of this Policy

If you have questions about our Acceptable Usage Guidelines, please reach out to our team here

For serious violations of our Guidelines that require follow up by 1mind, please report any incidents of abuse or concern.