Acceptable Use Policy
Effective Date: February 20, 2026 | Last Updated: February 27, 2026
This Acceptable Use Policy ("AUP") governs your use of ClawOps' AI automation services, tools, and platforms (collectively, the "Services"). This AUP supplements and is incorporated into our Terms of Service.
1. Purpose and Scope
This AUP defines acceptable and prohibited uses of ClawOps' AI-powered tools and services. By using our Services, you agree to comply with this AUP. Violation of this AUP may result in suspension or termination of your access to our Services.
2. General Principles
When using our Services, you must:
- Act Lawfully: Comply with all applicable laws, regulations, and third-party rights
- Act Ethically: Use Services in a manner consistent with ethical standards and societal norms
- Act Responsibly: Take responsibility for outputs generated using our Services
- Respect Others: Not harm, harass, or infringe upon the rights of others
- Protect Security: Not compromise the security or integrity of our Services or systems
3. Prohibited Uses
You may not use our Services to:
3.1 Illegal Activities
- Engage in or facilitate any illegal activity
- Violate any local, state, national, or international law or regulation
- Infringe or violate intellectual property rights, privacy rights, or other legal rights
- Facilitate money laundering, fraud, or other financial crimes
- Engage in or promote illegal gambling
- Traffic in illegal drugs, weapons, or other contraband
3.2 Harmful Content
Generate, distribute, or promote content that:
- Contains child sexual abuse material (CSAM) or exploits minors
- Promotes or incites violence, terrorism, or extremism
- Harasses, bullies, threatens, or intimidates individuals or groups
- Promotes hate speech or discrimination based on protected characteristics (race, ethnicity, religion, gender, sexual orientation, disability, etc.)
- Contains graphic violence or gore intended to shock or disturb
- Promotes self-harm, suicide, or eating disorders
- Promotes or facilitates human trafficking or exploitation
3.3 Fraudulent or Deceptive Practices
- Create or distribute spam, phishing attempts, or scams
- Impersonate any person, organization, or entity
- Generate fake reviews, testimonials, or social media engagement
- Create deepfakes or manipulated media to deceive or defraud
- Engage in astroturfing or fake grassroots campaigns
- Generate content intended to manipulate elections or political processes
- Create fraudulent documents, credentials, or certifications
3.4 Privacy Violations
- Process personal information without proper consent or legal basis
- Conduct unauthorized surveillance or tracking
- Dox individuals (publish private information without consent)
- Generate content that violates someone's privacy or confidentiality
- Scrape or harvest personal data without authorization
- Use Services to profile individuals for discriminatory purposes
3.5 Security and System Integrity
- Attempt to hack, breach, or circumvent security measures
- Introduce malware, viruses, or other malicious code
- Conduct denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
- Attempt to reverse engineer, decompile, or extract AI models
- Abuse or overload our Services to disrupt availability for others
- Bypass rate limits, usage restrictions, or access controls
- Share or resell access credentials to our Services
3.6 Misleading AI-Generated Content
- Generate content falsely presented as human-created when disclosure is required
- Create academic papers, essays, or assignments for submission as original student work (facilitating academic dishonesty)
- Generate fake news or disinformation campaigns
- Create misleading health or medical advice
- Generate content impersonating real individuals without disclosure
- Produce synthetic media (deepfakes) intended to deceive
3.7 Inappropriate Commercial Use
- Generate content that violates advertising standards or consumer protection laws
- Create pyramid schemes, multi-level marketing scams, or similar schemes
- Generate content for illegal or unregulated financial services
- Produce spam or unsolicited bulk communications
- Use Services to compete directly with ClawOps or create competing AI services
- Resell or redistribute our Services without authorization
3.8 Regulated Industries (Without Proper Authorization)
- Generate medical diagnoses, treatment plans, or prescriptions (without licensed medical professional oversight)
- Provide legal advice (without licensed attorney oversight)
- Offer financial or investment advice (without proper licensing and disclosures)
- Generate content for use in safety-critical applications (aviation, medical devices, nuclear facilities) without human oversight and validation
3.9 Intellectual Property Infringement
- Generate content that infringes copyrights, trademarks, patents, or trade secrets
- Use copyrighted materials as inputs without proper rights or licenses
- Create unauthorized derivative works of copyrighted content
- Generate content that violates third-party terms of service or licensing agreements
3.10 Discriminatory or Unethical Practices
- Use AI to make consequential decisions about individuals (employment, credit, housing, etc.) without human oversight and compliance with anti-discrimination laws
- Generate biased or discriminatory content targeting protected groups
- Use Services for exploitative labor practices
- Generate content promoting unethical research or practices
4. AI-Specific Responsible Use Guidelines
4.1 Human Oversight
- High-Stakes Decisions: AI outputs used for consequential decisions (hiring, lending, medical treatment, legal advice) must be reviewed and validated by qualified human professionals.
- Sensitive Content: AI-generated content related to sensitive topics (health, finance, legal matters) should be reviewed before publication or use.
- Quality Control: Implement human review processes to catch errors, biases, or inappropriate outputs.
4.2 Accuracy and Verification
- Fact-Checking: Verify factual claims in AI-generated content before using or distributing.
- Disclaimer: Disclose that content is AI-generated when appropriate or required.
- Limitations: Acknowledge AI limitations and don't present AI outputs as infallible.
4.3 Transparency and Disclosure
- AI Attribution: Disclose when content is AI-generated in contexts where this is material (journalism, academic work, official communications).
- Synthetic Media: Clearly label deepfakes, synthetic voices, or AI-generated images when used in media or communications.
- Limitations Notice: Inform end users of AI system limitations and potential for error.
4.4 Bias Mitigation
- Monitor for Bias: Review AI outputs for potential biases related to race, gender, age, disability, or other protected characteristics.
- Diverse Testing: Test AI systems with diverse inputs to identify potential discriminatory outputs.
- Feedback Loop: Report biased or problematic outputs to ClawOps for improvement.
4.5 Data Protection
- Minimize Data: Only input personal data that is necessary for your use case.
- Consent: Ensure you have proper consent or legal basis to process personal data through AI systems.
- Sensitive Data: Avoid inputting highly sensitive personal information (health records, financial account numbers, government IDs) unless necessary and properly secured.
- Anonymization: Anonymize or pseudonymize data when possible before processing.
5. Shield Scanner - Specific Rules
In addition to the general rules above, the following rules apply specifically to the ClawOps Shield scanner service:
5.1 Authorized Scanning Only
You may only scan files that you own or have explicit authorization to scan. Scanning files belonging to others without their consent is prohibited.
5.2 No Exploitation of Results
You must not use the Shield scanner to identify vulnerabilities, weaknesses, or patterns for the purpose of exploitation, attack, or malicious activity. Shield is a defensive tool and must be used solely for protective purposes.
5.3 Automated and Bot Scanning
Automated or bot-driven scanning that exceeds your plan limits is prohibited. You must not use scripts, bots, or other automated tools to bypass scan limits or abuse the service. API access for automation is available only on the Enterprise plan and must comply with rate limits.
5.4 Reverse Engineering Prohibited
You must not reverse engineer, extract, decompile, or replicate Shield's detection rules, patterns, heuristics, or scanning logic. This includes attempting to determine the specific signatures or rules used by the scanner.
6. Compliance with Third-Party Terms
Our Services utilize third-party AI platforms (OpenAI, Anthropic). You must also comply with:
Violations of third-party terms may also constitute violations of this AUP.
7. Reporting Violations
6.1 How to Report
If you become aware of violations of this AUP, please report them to:
Email: contact@theclawops.com
Subject Line: "AUP Violation Report"
6.2 What to Include
- Description of the violation
- Evidence (screenshots, URLs, examples)
- Date and time of occurrence
- Any relevant account or user information
6.3 Investigation
ClawOps will investigate reported violations and take appropriate action, which may include:
- Warning the user
- Suspending access to Services
- Terminating the user's account
- Reporting illegal activity to law enforcement
- Taking legal action
8. Monitoring and Enforcement
7.1 Monitoring
ClawOps reserves the right to:
- Monitor use of our Services for compliance with this AUP
- Use automated systems to detect prohibited content or activities
- Review user-generated content, inputs, and outputs
- Investigate suspected violations
7.2 Enforcement Actions
Violations of this AUP may result in:
- Warning: First-time or minor violations may receive a warning
- Suspension: Temporary suspension of access to Services (typically 7-30 days)
- Termination: Permanent termination of account and access to Services
- Legal Action: Referral to law enforcement or civil litigation for serious violations
- No Refund: No refund of fees for accounts terminated due to AUP violations
7.3 Repeat Violations
Repeated violations of this AUP will result in escalating enforcement actions, up to and including permanent termination.
9. User Responsibilities
8.1 Review Outputs
You are responsible for reviewing and validating all AI-generated outputs before use or distribution. ClawOps is not liable for your use of AI-generated content.
8.2 Compliance Burden
You are responsible for ensuring your use of our Services complies with:
- All applicable laws and regulations
- Industry-specific regulations relevant to your business
- Third-party terms of service and licenses
- This AUP and our Terms of Service
8.3 End User Agreements
If you use our Services to provide services to your own customers or end users, you must:
- Establish your own acceptable use policy for your end users
- Monitor your end users for compliance
- Take action against end users who violate acceptable use standards
- Indemnify ClawOps for violations by your end users
10. Content Moderation
9.1 Automated Filtering
ClawOps and our third-party AI providers may use automated content filtering to detect and block prohibited content.
9.2 False Positives
If you believe your content was incorrectly flagged or blocked:
- Contact us at contact@theclawops.com with details
- Provide context explaining why the content should be permitted
- We will review and respond within five (5) business days
9.3 Appeals
You may appeal enforcement actions by emailing contact@theclawops.com with:
- Your account information
- Description of the enforcement action
- Explanation of why you believe the action was incorrect
- Evidence supporting your appeal
Appeals will be reviewed by a human (not automated systems) within ten (10) business days.
11. Educational and Research Use
10.1 Permitted Research
Research use of our Services is generally permitted, including:
- Academic research on AI systems, capabilities, and limitations
- Security research to identify vulnerabilities (with responsible disclosure)
- Testing for bias, fairness, and ethical issues
- Educational use in classroom settings
10.2 Research Restrictions
Research use must not:
- Violate other provisions of this AUP (no harmful content, illegal activities, etc.)
- Abuse or overload our systems
- Extract or attempt to replicate our AI models
- Be used for commercial purposes without appropriate licensing
10.3 Responsible Disclosure
If security research identifies vulnerabilities, you must:
- Report findings to contact@theclawops.com before public disclosure
- Provide reasonable time (90 days) for remediation
- Not exploit vulnerabilities for harm or personal gain
12. Age Restrictions
Our Services are intended for users aged 18 and older. Users under 18 may only use our Services with:
- Parental or guardian consent
- Supervision by a parent, guardian, or educator
- Compliance with applicable children's privacy laws (COPPA, GDPR provisions for children)
13. Geographic Restrictions
Our Services may not be available in all jurisdictions. You may not use our Services if:
- You are located in a country subject to U.S. trade embargoes or sanctions
- You are on any U.S. government list of prohibited or restricted parties
- Use would violate local laws or regulations
14. Changes to This AUP
ClawOps may update this AUP at any time to:
- Reflect changes in our Services
- Address new types of misuse
- Comply with legal or regulatory requirements
- Align with industry best practices
14.1 Notification
We will notify you of material changes by:
- Posting the updated AUP on theclawops.com
- Updating the "Last Updated" date
- Sending email notification to your registered email address
14.2 Continued Use
Your continued use of our Services after changes take effect constitutes acceptance of the updated AUP.
14.3 Objection
If you do not agree to changes, you may terminate your account by contacting us at contact@theclawops.com.
15. No Waiver
Our failure to enforce any provision of this AUP does not constitute a waiver of that provision or any other provision. We reserve all rights to enforce this AUP at our discretion.
16. Severability
If any provision of this AUP is found invalid or unenforceable, the remaining provisions will remain in full force and effect.
17. Contact Information
For questions, concerns, or to report violations of this AUP, contact:
Email: contact@theclawops.com
Website: theclawops.com
Examples of Acceptable vs. Prohibited Use
✅ Acceptable Uses:
- Generating marketing copy for legitimate products or services
- Creating workflow automations to improve business efficiency
- Analyzing data to derive business insights
- Generating creative content (stories, art, music) for personal or commercial use
- Automating customer support responses (with human oversight)
- Conducting research on AI capabilities and limitations
- Generating code or technical documentation
- Creating educational content and training materials
❌ Prohibited Uses:
- Generating spam emails for mass distribution
- Creating fake reviews to manipulate product ratings
- Generating content promoting hate speech or violence
- Creating deepfake videos to impersonate public figures for deception
- Using AI to make hiring decisions without human review
- Generating medical diagnoses without licensed physician oversight
- Creating phishing emails or scam messages
- Generating academic papers for students to submit as their own work
Acknowledgment
By using ClawOps' Services, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy.
Version: 1.1
Last Updated: February 27, 2026