Acceptable Use Policy

Acceptable Use Policy (AUP)

Last Updated: 2 November 2025

This Acceptable Use Policy (AUP) defines prohibited uses of TaskAGI's platform and services. This policy supplements our Terms and Conditions, AI Model Usage Policy, and Web Scraping Terms. Violations may result in account suspension or termination without refund.


1. General Prohibited Uses

You may NOT use TaskAGI for any purpose that:

1.1. Violates Laws:
  • Is illegal under EU, UK, or applicable local laws
  • Violates intellectual property rights (copyright, trademark, trade secret, etc.)
  • Violates data protection laws (GDPR, UK DPA 2018, CCPA, etc.)
  • Violates export control or sanctions laws
  • Constitutes fraud, identity theft, or financial crime

1.2. Harms Others:
  • Threatens, harasses, bullies, or intimidates individuals
  • Stalks, doxxes, or invades privacy
  • Discriminates based on protected characteristics (race, religion, gender, sexual orientation, disability, etc.)
  • Defames or spreads false information about individuals or organizations

1.3. Harms TaskAGI or Third Parties:
  • Disrupts, damages, or impairs TaskAGI's infrastructure or services
  • Attempts to gain unauthorized access to TaskAGI systems or other users' accounts
  • Overloads third-party integrations or violates their rate limits
  • Reverse-engineers, decompiles, or attempts to extract source code from TaskAGI
  • Circumvents usage limits, billing, or security measures

1.4. Violates Third-Party Terms:
  • Uses integrations in ways that violate the third-party provider's Terms of Service
  • Shares TaskAGI credentials or API keys with unauthorized parties
  • Resells or white-labels TaskAGI services without written permission


2. Prohibited Content

You may NOT create, transmit, store, or process the following types of content using TaskAGI:

2.1. Child Sexual Abuse Material (CSAM):
  • Any content depicting, promoting, or facilitating child sexual abuse or exploitation
  • This includes AI-generated CSAM (zero tolerance - immediate account termination and law enforcement reporting)

2.2. Non-Consensual Intimate Content:
  • Non-consensual intimate images or deepfakes (revenge pornography)
  • Upskirt photos, hidden camera recordings, or voyeuristic content
  • AI-generated nude images of real individuals without their consent

2.3. Violence and Extremism:
  • Content promoting terrorism, violent extremism, or mass violence
  • Instructions for creating weapons, explosives, or instruments of mass harm
  • Glorification of mass shootings, terrorist attacks, or genocide
  • Content promoting or instructing self-harm or suicide

2.4. Hate Speech:
  • Content promoting hatred, violence, or discrimination against protected groups
  • Neo-Nazi, white supremacist, or other extremist ideologies
  • Content denying or glorifying genocide or crimes against humanity

2.5. Illegal Goods and Services:
  • Drugs, weapons, explosives, or controlled substances
  • Stolen goods, counterfeit products, or pirated content
  • Human trafficking, prostitution, or sexual exploitation services
  • Gambling or betting services in prohibited jurisdictions

2.6. Malware and Hacking Tools:
  • Viruses, trojans, ransomware, or other malicious software
  • Hacking tools designed for unauthorized access (except for authorized security research)
  • Phishing kits, credential stealers, or scam tools


3. Prohibited AI Model Uses

In addition to the AI Model Usage Policy, you may NOT:

3.1. Generate Harmful AI Content:
  • CSAM or sexualized content involving minors (including AI-generated)
  • Non-consensual deepfakes or impersonations
  • Disinformation campaigns or election manipulation
  • Fake news designed to deceive readers
  • Spam, phishing emails, or scam content

3.2. Automated High-Risk Decisions Without Human Oversight:
  • Medical diagnoses or treatment recommendations
  • Legal sentencing or case outcome predictions
  • Hiring, firing, or promotion decisions
  • Credit or insurance eligibility determinations
Note: AI may assist in these areas WITH qualified human oversight and final decision-making authority.

3.3. Academic Dishonesty:
  • Using AI to complete academic assignments without disclosure (plagiarism)
  • Generating fake research, citations, or data

3.4. Impersonation and Fraud:
  • Impersonating individuals, brands, or organizations without disclosure
  • Creating fake social media profiles or engagement (likes, followers, reviews)
  • Generating fake testimonials or product reviews


4. Prohibited Web Scraping Activities

In addition to the Web Scraping Terms, you may NOT:

4.1. Scrape Websites Prohibiting Scraping:
  • Scraping websites that explicitly prohibit scraping in their Terms of Service
  • Ignoring robots.txt files or crawl-delay directives
  • Circumventing technical protections (CAPTCHAs, IP blocks, paywalls) without authorization

4.2. Aggressive Scraping:
  • Scraping at rates that overload or disrupt target servers (DoS-like behavior)
  • Ignoring rate limits or error responses from target websites
  • Using excessive concurrent connections

4.3. Privacy-Invasive Scraping:
  • Scraping personal data without a valid GDPR legal basis
  • Building databases for spam, harassment, or stalking
  • Scraping non-public data (behind authentication) without permission
  • Scraping sensitive personal data (health, finances, political views) without explicit consent

4.4. Competitive Misappropriation:
  • Scraping to create a direct competitor that mirrors the target website
  • Misappropriating trade secrets or proprietary business data
  • Real-time price scraping to undercut competitors (may violate antitrust laws)


5. Prohibited Marketing and Communication Activities

5.1. Spam:
  • Sending unsolicited bulk emails (spam) in violation of CAN-SPAM, GDPR, or UK PECR
  • Sending marketing emails without proper consent or opt-out mechanisms
  • SMS spam or robocalls without consent

5.2. Phishing and Scams:
  • Phishing emails or fake login pages designed to steal credentials
  • Business Email Compromise (BEC) scams
  • Advance-fee scams (419 scams, lottery scams, etc.)
  • Fake invoices or payment requests

5.3. Deceptive Marketing:
  • False advertising or misleading product claims
  • Pyramid schemes or multi-level marketing (MLM) scams
  • Fake reviews, testimonials, or social proof
  • Clickbait or deceptive subject lines

5.4. GDPR/Privacy Violations:
  • Sending marketing emails to EU/UK residents without valid consent
  • Failing to honor unsubscribe requests within 30 days
  • Purchasing email lists without verifying consent provenance
  • Failing to include required sender information and opt-out mechanisms


6. Prohibited Financial and E-Commerce Activities

6.1. Fraud and Financial Crime:
  • Payment fraud, credit card fraud, or chargeback fraud
  • Money laundering or terrorist financing
  • Ponzi schemes, investment fraud, or pump-and-dump schemes
  • Tax evasion or invoice fraud

6.2. Prohibited Financial Services:
  • Unlicensed money transmission or currency exchange
  • Unregistered securities offerings or crowdfunding
  • Payday loans or predatory lending in prohibited jurisdictions
  • Cryptocurrency scams or rug-pull schemes

6.3. Counterfeit and IP Infringement:
  • Selling counterfeit goods (fake designer products, etc.)
  • Selling pirated software, movies, music, or books
  • Trademark infringement (selling unauthorized branded products)


7. Account Abuse and Security Violations

7.1. Unauthorized Access:
  • Attempting to access other users' accounts or data
  • Brute-force attacks, credential stuffing, or password spraying
  • Exploiting security vulnerabilities without responsible disclosure
  • Social engineering TaskAGI support to gain unauthorized access

7.2. Account Manipulation:
  • Creating multiple accounts to circumvent usage limits or bans
  • Sharing account credentials with unauthorized users
  • Using stolen payment methods or fraudulent billing information
  • Circumventing billing or usage metering systems

7.3. Resource Abuse:
  • Using TaskAGI for cryptocurrency mining
  • Running infinite loops or resource-intensive workflows to degrade service
  • Storing large files unrelated to legitimate workflows

7.4. API Abuse:
  • Exceeding API rate limits or making excessive requests
  • Using API keys for unauthorized purposes or sharing them publicly
  • Reverse-engineering API endpoints or internal protocols


8. Intellectual Property Violations

8.1. Copyright Infringement:
  • Uploading, processing, or distributing copyrighted content without permission
  • Scraping copyrighted content for republication (articles, images, videos)
  • Using AI to generate derivative works that infringe copyrights

8.2. Trademark Infringement:
  • Using TaskAGI to sell counterfeit or unauthorized branded products
  • Impersonating brands or creating confusion about affiliation

8.3. Trade Secret Misappropriation:
  • Using scraped or accessed data that constitutes trade secrets
  • Reverse-engineering proprietary algorithms or business processes

8.4. DMCA Compliance: If you receive a DMCA takedown notice, you must promptly remove infringing content. Repeat offenders will have their accounts terminated.


9. Data Protection and Privacy Violations

9.1. GDPR Violations:
  • Processing personal data without a valid legal basis
  • Failing to honor data subject rights (access, deletion, portability, objection)
  • Processing sensitive personal data without explicit consent
  • Transferring personal data to non-adequate countries without safeguards (SCCs, BCRs)

9.2. Data Breach Negligence:
  • Storing personal data without appropriate security measures
  • Failing to report data breaches to supervisory authorities (within 72 hours per GDPR)
  • Publicly exposing databases containing personal data

9.3. Surveillance and Tracking:
  • Using TaskAGI for unauthorized employee monitoring or surveillance
  • Tracking individuals' locations or activities without consent
  • Installing spyware or stalkerware


10. Enforcement and Consequences

10.1. Monitoring: We reserve the right to monitor usage for AUP violations using automated and manual methods. This includes reviewing:
  • Workflow configurations
  • AI prompts and outputs (for abuse detection only)
  • Scraping targets and patterns
  • API usage patterns

10.2. Consequences for Violations:
  • First Offense (Minor): Warning email with 7 days to remedy
  • Serious Offense: Immediate account suspension pending investigation
  • Severe Offense (CSAM, terrorism, etc.): Immediate account termination + law enforcement reporting
  • Repeat Offenses: Permanent account termination without refund

10.3. No Refunds: If your account is suspended or terminated for AUP violations, you are NOT entitled to refunds for unused credits or subscription fees. See our Refund Policy.

10.4. Legal Action: We reserve the right to pursue legal action for violations that cause harm to TaskAGI, our users, or third parties. You are liable for damages, legal fees, and costs.

10.5. Law Enforcement Cooperation: We will cooperate with law enforcement investigations and may disclose user data when legally required or when we believe a violation involves illegal activity (CSAM, terrorism, fraud, etc.).


11. Reporting Violations

If you become aware of AUP violations by other TaskAGI users:

Report Abuse: abuse@taskagi.net
DMCA Takedowns: dmca@taskagi.net
Security Vulnerabilities: security@taskagi.net
CSAM/Illegal Content: legal@taskagi.net (urgent - we report to authorities)

Include as much detail as possible: user ID, workflow URL, evidence, date/time, description of violation.


12. Updates to This Policy

We may update this Acceptable Use Policy at any time to address new risks, technologies, or legal requirements. Material changes will be notified via email or platform notice. Continued use after changes constitutes acceptance of the updated policy.


13. Contact

AUP Questions: support@taskagi.net
Report Abuse: abuse@taskagi.net
Legal Inquiries: legal@taskagi.net

Related Documents: