Studio Acceptable Use Policy
This Acceptable Use Policy is a part of and is governed by our Terms of Service, to which you have agreed and by which you are legally bound and governs all use of the Service and breaches of the policy my lead to suspending, disabling, or removal of account and/or access. Without limiting the other terms and conditions in the Terms of Service, this Acceptable Use Policy governs how you may use the Services. We may change the Acceptable Use Policy from time to time as set forth in the Terms of Service. Capitalized terms used in this Acceptable Use Policy and not otherwise defined herein shall have the corresponding meaning set forth in the Terms of Service.
You may not (and may not permit any third party to) use the Service in a manner contrary to the requirements of us, your Service Provider, regulator or self-regulatory body. Our Services may be used only for lawful purposes and may not be used for any illegal, improper or abusive activities.
The following list gives examples of uses of the Service, or using the Studio Creation Environment to create uses of the Service, that are illegal, improper or abusive. This list is provided by way of example and is not exhaustive and it is your responsibility to comply with all applicable laws.
- Damaging, interfering with or adversely impacting the availability, reliability, or stability of our Services or third party systems and networks relating to or connecting to our Services.
- Overburdening, disabling, or launching or facilitating a denial of service attack on any of our Services, or interfaces of the Service, or third party systems and networks relating to our Services.
- Attempting to circumvent or break any security mechanism on any of the Services or using the Services in any manner that poses a security or other risk to us, our vendors, our Service Providers, or any end user of our Services, or any of our or their respective customers.
- Benchmarking, tampering with, unauthorized testing, reverse-engineering, decompiling, or otherwise using the Services in order to find limitations or vulnerabilities or evade filtering capabilities, or any other purpose not authorized by us.
- Attempting to reverse engineer any Inference generated API keys.
- Attempting to use our Service at a volume dramatically higher than the capacity you ordered.
- Using our Service to infringe on the registered intellectual property of third parties.
- Interfering with a third party’s use and enjoyment of our Services.
- Using the Services in any manner that may subject us or any third party to liability, damages or loss.
- Using the Services in any manner that violates any applicable third party policies or requirements including, without limitation, using the Services in any manner that violates the Mobile Marketing Association guidelines and/or best practices, carrier guidelines, or any other applicable industry standards.
- Using Inference Studio to create services that violate industry standards relevant to the task and the country in which they operate, for example Payment Card Industry Data Security Standards for credit card payments and Health Insurance Portability and Accountability Act when handling medical information.
- Using your account to engage in fraudulent activity with respect to third parties or otherwise bypass legitimate identification systems.
- Intending to mislead or defraud the receiving partner or Impersonating any person or entity without his, her or its consent.
- Where prohibited by applicable law, engaging in spamming, activities that are considered spamming, or other unsolicited advertising, marketing or other activities, including, without limitation, any activities that violate anti-spamming laws and regulations such as, without limitation, the CAN SPAM Act of 2003, the Telephone Consumer Protection Act, Telephone Consumer Fraud & Abuse Prevention Act, Children’s Online Privacy Protection Act, the Do-Not-Call Register, and the Do-Not-Call Implementation Act.
- Using the Services in violation of the Electronic Communications Privacy Act, the Regulation of Investigatory Powers Act, or any other analogous law or regulation applicable to your use of the Services.
- Using the Services in connection with any unsolicited, unwanted or harassing calls, messages, or other communications.
- Where prohibited by applicable law, using long virtual numbers for marketing purposes.
- Offering or purporting to offer any Emergency Services. “Emergency Services” means services that allow a user to connect with emergency services personnel or public safety answering points such as 911 or E911 services.
- Using manual or automated software, devices, or other processes to “crawl” or “spider” any page of the Services; linking to the Services without our express written consent; or harvesting or scraping any Content from the Services, including without limitation, harvesting or otherwise collecting information about others, including email addresses or phone numbers, from our website without their express consent
- Violating or facilitating the violation of any country, state, province, local or international law, rule, legal order, or regulation.
- Engaging in any activity that the United States Federal Communications Commission or any similar entity or authority in any other jurisdiction has restricted or regulated with regard to proper use of the public telephony network.
- Using the Services, or a component of the Services, in a manner not authorized by us.
- Reselling, sublicensing, renting or timesharing the Services or any portion of our Services without our express, specific prior written consent in an agreement signed by our Chief Executive Officer. In any event, any permitted resale is conditioned upon your obtaining, maintaining, and providing to us upon request, reasonable Know Your Customer information in compliance with applicable law for each of your direct and indirect customers using the Services, and may not be extended to anonymous users. Without limiting the foregoing, you must maintain the following information for each of your users using the Services: name, verified telephone number, verified e-mail address, method of payment, payment information, and IP address.
- Using long virtual numbers or voice numbers to receive messages for the purposes of identity verification, bulk messaging, automated messaging, messages using automated dialing, pre-recorded messaging, and the like.
- Forwarding from a virtual number to a dead endpoint (e.g. if you forward from a virtual number, you must make a reasonable attempt to receive or answer the message, as applicable).
- Using the Services in any manner that results in charges to Inference by third parties, such as originating access charges, dip charges, collect calls, calls made to NPA-976-XXX or 900-XXX-XXXX numbers, or any other number or service where the calling party is billed for the call by the calling party’s provider on behalf of the terminating provider or its customer; or otherwise calling or sending messages to Premium Number ranges without our prior written consent in each instance.
- Artificially inflating traffic (e.g. generating traffic that has been artificially increased to boost the revenue of an entity or network without offering any real benefit to the originator of the call).
- Unless otherwise agreed in advance, sending a substantial amount of voice traffic, as reasonably determined by Inference, only to specific regions or number ranges within a country in a manner that would cause Inference to incur material costs beyond those incurred by Inference when sending similar quantities of voice traffic equally spread across all regions and number ranges within such country; in the event of violation of this clause, for the avoidance of doubt, Inference reserves the right to immediately suspend the relevant portion of the Service to You.
- Bundling, aggregating or otherwise combining in any way any messages originating from any other telephone number, or engaging in group messaging; each number shall only be used for messages originating and terminating to such single, unique telephone number.
- Using the Services in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, or other devices or systems in which malfunction of the Services would result in foreseeable risk of injury or death or the operator of the device or system, or to others.
- Engaging in activities or, uploading, downloading, submitting, transmitting, distributing or facilitating the distribution of, any information that contains “inappropriate content” in connection with the Services. Inappropriate content includes, but is not limited to, content that:
- May be considered libellous, slanderous, defamatory, threatening, sexually explicit, vulgar, profane, obscene, offensive, abusive, malicious or otherwise harmful to any person or entity, constitutes or promotes “hate speech” or is otherwise discriminatory based on race, sex, creed, religion, nationality, disability, sexual orientation, language, or age.
- Is fraudulent, deceptive, inaccurate or misleading (including, without limitation, by creating a false identity or forged email address or header, or phone number, or otherwise attempting to mislead others as to the identity of the sender or the origin or contents of a message or other communication using your account).
- Contains or transmits viruses, trojan horses, malware, worms or any other malicious, harmful, or deleterious programs or similar destructive programming routines.
- Interferes with or disrupts networks connected to the Services or violates the regulations, policies or procedures of such networks.
- Promotes, markets or otherwise relates to illegal activities or terrorism.
- Infringes on, misappropriates, or violates any intellectual property rights or other rights of third parties, including but not limited to trademark, copyright, patent, trade secrets, rights of publicity, and rights of privacy.
- Constitutes or relates to “adult services” or content of an adult nature, including, without limitation, content that contains or depicts nudity, contains or depicts sexual activity, or is otherwise inappropriate as determined by us in our sole discretion.
- Includes sensitive financial, Medical, Health, Identification, or other private information or documents.
- Uses or includes any Open Source Software in connection with the Services in any manner that requires that any portion of the Services be (a) disclosed or distributed in source code form, (b) made available free of charge to recipients, or (c) modifiable without restriction by recipients. “Open Source Software” means any software, documentation or other material that contains, or is derived (in whole or in part) from, any software, documentation or other material that is distributed as free software, open source software (e.g., Linux) or similar licensing or distribution models, including, but not limited to software, documentation or other material licensed or distributed under any of the following licenses or distribution models, or licenses or distribution models similar to any of the following: (i) GNU’s General Public License (GPL), Lesser/Library GPL (LGPL), or Free Documentation License, (ii) The Artistic License (e.g., PERL), (iii) the Mozilla Public License, (iv) the Netscape Public License, (v) the Sun Community Source License (SCSL), (vi) the Sun Industry Standards License (SISL), (vii) the BSD License and (viii) the Apache License.
If you or others using your account violate (or if we have reason to believe that you have violated or have encouraged others to violate) this Acceptable Use Policy, in addition to our available rights and remedies described in the Terms of Service, we may investigate the incidents that we believe are contrary to this Acceptable Use Policy and provide requested information to affected third parties. Our failure to enforce this policy does not amount to a waiver of our rights hereunder.