Acceptable Use Policy (AUP)
Effective date: September 15 2025
Last updated: September 15, 2025
This acceptable use policy (the “Policy”) applies to all hosted, cloud-based services operated by Enable. Unless otherwise indicated, capitalized terms used herein but not defined herein have the meanings ascribed to them in the applicable agreements between Customer and Enable governing Customer’s use of the Services (the “Agreement”), or if not defined in the Agreement, in the Enable Terms of Service located at https://www.enable.com/terms-of-service (or such successor URL as may be designated by Enable) (the “Website”).
By accessing or using the Services, each Customer and user (collectively, “Customer” or “you”) agrees to comply with this Policy. Enable may update this Policy from time to time; material updates will be posted and become effective upon posting or as otherwise stated. Your continued use of the Services after such changes constitutes your acceptance of the revised Policy.
- Scope and Shared Responsibility
- This Policy applies to all use of the Services, including beta features, developer sandboxes, and any artificial intelligence (“AI”) capabilities made available by Enable or third parties through the Services.
- Secure and compliant use of the Services is a shared responsibility. Enable is responsible for the security and availability of the Services as described in the Agreement and our security documentation. Customers are responsible for configuring, managing, and using the Services in compliance with this Policy, applicable law, and their own internal policies.
- Account & Access Responsibilities
- Keep credentials confidential; do not share accounts or tokens except as expressly permitted by the Services.
- Implement appropriate administrative, physical, and technical safeguards for Customer Data.
- Promptly notify Enable of any suspected unauthorized access to the Services or to Customer Data within the Services.
- Use only documented and supported interfaces to access the Services; do not bypass access controls or technical restrictions.
- Prohibited Content and ConductYou may not use the Services to:
- Unlawful, Harmful, or Rights‑Violating Activity
- Violate applicable laws or regulations; infringe, misappropriate, or otherwise violate third‑party rights (including privacy, intellectual property, publicity, export, and sanctions laws).
- Harass, threaten, defame, discriminate against, or otherwise harm individuals or groups; publish others’ personal or confidential information without authorization.
- Security, Integrity, and Network Abuse
- Probe, scan, or test the vulnerability of any system or network; breach or otherwise circumvent any security or authentication measure; or access the Services or related systems without authorization.
- Interfere with or disrupt the integrity or performance of the Services, including by introducing malware, performing denial‑of‑service attacks, or imposing unreasonable load (e.g., excessive API calls, automated scraping outside documented limits).
- Attempt to reverse engineer, decompile, or extract source code, models, or non‑public APIs, except to the extent a lawful exception applies and only with prior written notice to Enable.
- Messaging, Spam, and Abuse of Communications Features
- Send unsolicited or unauthorized advertising, promotions, or spam; harvest addresses or other identifiers from the Services for the purpose of sending commercial communications without required consent.
- Misuse of the Services
- Resell, sublicense, or provide the Services to third parties except as expressly permitted in the Agreement or Documentation.
- Store or stream large media libraries or other content unrelated to the intended use of the Services, or otherwise exceed fair‑use or documented service thresholds.
- Use the Services to create or distribute deceptive or manipulated content (including deepfakes) that could cause harm, confusion, or fraud.
- Unlawful, Harmful, or Rights‑Violating Activity
- Artificial Intelligence (AI) — Responsible Use RequirementsEnable may offer AI‑powered features (including generative AI) within the Services (the “AI Features”). In addition to the prohibitions above, you must comply with the following when using AI Features:
- Prohibited AI Uses.You may not use AI Features for:
- Automated decisions with legal/similar effects without appropriate human oversight and disclosures. Examples include decisions in employment, credit, insurance, housing, healthcare, education, essential services, law enforcement, immigration, and access to public benefits. A qualified human must review material outputs and take other factors into account before final decisions.
- Individualized professional advice in regulated domains (including legal, financial, or medical advice) presented as a substitute for licensed expertise; AI outputs used in these domains must be reviewed and approved by qualified personnel.
- Profiling based on protected attributes or processing biometric identifiers to determine or infer sensitive characteristics; do not submit images, video, or audio for facial recognition, voiceprinting, or emotion recognition except where expressly permitted by law and Documentation.
- Political campaigning or lobbying intended to influence elections, legislation, or civic participation.
- Adult sexual content (including sexual chatbots) or content that exploits or endangers minors; any suspected child sexual exploitation content will be reported to appropriate authorities.
- Manipulative or deceptive practices, including plagiarism, academic dishonesty, undisclosed synthetic media, or content designed to mislead users as to its human or automated origin.
- Safety, Disclosure, and Human‑in‑the‑Loop
- Treat AI outputs as probabilistic and potentially inaccurate or biased; implement human review and validation processes appropriate to your risk profile and use case.
- Do not attempt to circumvent safety systems or prompt the AI to violate this Policy. Do not use AI Features to impersonate individuals or entities without authorization.
- Model Use and Isolation
- Some AI Features may invoke third‑party models or services. Use of such models is subject to this Policy and any applicable third‑party terms identified in the Documentation. Do not submit data you are not authorized to disclose to such models.
- Customers must not perform model extraction, membership inference, or similar adversarial attacks against the AI Features. Security testing of the Services requires prior written authorization from Enable.
- Prohibited AI Uses.You may not use AI Features for:
- Platform and API Fair Use
- Comply with documented rate limits, request quotas, and concurrency limits for APIs and AI Features.
- Use supported SDKs and endpoints; do not scrape, bulk‑harvest, or otherwise access the Services through undocumented methods.
- Do not create substantially similar cloud services using or built on the Services unless expressly authorized.
- Third‑Party Services and Customer Obligations
- You are responsible for third‑party services, applications, or data sources you connect to the Services, and for obtaining any required consents and notices to process personal data or other regulated data via the Services and AI Features.
- You are responsible for the accuracy, quality, and legality of the data you submit to the Services and for your end users’ compliance with this Policy.
- Reporting, Monitoring, and Enforcement
- Enable may monitor the Services for security, operational integrity, and Policy enforcement purposes.
- Without affecting any other remedies available to Enable, Enable may permanently or temporarily remove content, suspend or terminate access (in whole or in part), throttle usage, disable AI Features, or take other reasonable actions if we believe, in our discretion, that your use violates this Policy, applicable law, or poses a risk to the Services or others. Enable may take these actions without notice or liability if Enable determines, in its discretion, that a violation of this Policy has occurred.
- You agree to cooperate with Enable in investigating suspected violations and to implement appropriate remediation.
- Export Controls, Sanctions, and Government Use
- You may not use the Services in violation of export control, sanctions, or embargo laws. You may not use the Services for prohibited or restricted end uses (e.g., weapons development) or with sanctioned parties.
- Penetration Testing & Vulnerability Reporting
- Do not conduct penetration tests, security scans, or similar research on the production Services without Enable’s prior written authorization. Report suspected vulnerabilities through Enable’s responsible disclosure process identified in the Documentation.
- Consequences of Violation
- Violations of this Policy constitute a material breach of the Agreement and may result in immediate suspension or termination of all or part of the Services, removal or disabling of content, and referral to law enforcement or regulators where appropriate.
- Contact
- Questions or reports of violations: help@www.enable.com.