# Acceptable Use Policy
Effective date: November 25, 2025
**Parallel Web Systems, INC.**
**ACCEPTABLE USE POLICY**
This Acceptable Use Policy (also referred to as our “**AUP**”) applies to anyone who uses or interacts with any of Parallel Web Systems, Inc.’s (“**Parallel**”) products and services, including all uses and interactions by, with, or through AI agents and agentic features, and/or via any authorized resellers or passthrough access (such as access provided by our enterprise customers to their end customers). This AUP forms part of the agreement that governs your use of our products and services.
We cannot predict all acceptable or unacceptable uses of our technology, which is why the prohibited or restricted conduct in this AUP is not exhaustive. If we detect or reasonably suspect a violation of this AUP by you or through your account, we may throttle, suspend, or terminate your access to our products and services. If you discover that our model outputs are inaccurate, biased, or harmful, please notify us at support@parallel.ai.
This AUP is intended to help our users stay safe, while ensuring our products and services are being used responsibly and mitigating potential harms.
## **1. General Use Restrictions**
You may not contribute anything (including any inputs, training data, or user-generated content) or otherwise use or interact with our products or services in ways that:
### **a. Violate Rights or Laws**
- - infringe, violate, or misappropriate the intellectual property rights, privacy rights, or any other rights of any person or entity (including Parallel's rights);
- - violate any law or regulation, including, without limitation, any applicable export control, sanctions, and trade compliance laws, privacy and data protection laws, and laws related to consumer and child protection, anti-spam, obscenity or defamation;
- - facilitate, promote, or engage in fraud, counterfeit or illicit goods, schemes, scams, phishing, or malware;
### **b. Threaten Security or Privacy**
- - jeopardize the security of your account or any other account, including allowing or gaining unauthorized access, attempting to obtain passwords or security information, or engaging in activities that violate the security of any service, system, or network;
- - violate any privacy rights, such as sharing or accessing personal information without consent, or collecting or using personal data from minors without having obtained required consents;
- - misuse, collect, solicit, or gain access without permission to private information such as non-public contact details, health data, biometric or neural data (including facial recognition), or confidential or proprietary data;
- - create or distribute malware, ransomware, or other types of malicious code;
- - develop or use tools for denial-of-service, interception, or unauthorized monitoring/device control;
- - develop persistent access tools below system security levels, including firm-ware/hardware implants;
- - create or use automated tools designed to compromise multiple systems at scale for malicious purposes;
- - bypass or circumvent security controls, authenticated systems, endpoint protection, monitoring tools, or product guardrails;
- - use of someone’s likeness, including their photorealistic image or voice, without their consent in ways that could confuse authenticity;
### **c. Misuse Our Technology**
- - “crawl,” “scrape,” or “spider” or otherwise extract data or output from our products or services (through use of manual or automated or programmatic means), other than via our documented APIs for our products and services;
- - reverse engineer, decompile, disassemble or otherwise attempt to discover the source code, object code or underlying structure, ideas or algorithms of our products, services, APIs, or any software, documentation or data related thereto;
- - take any action that imposes, or may impose (as determined by us, in our sole discretion), an unreasonable or disproportionately large load on our infrastructure
- - create similar or competitive products or services as our products or services or otherwise compete with us or assist any others to compete with us;
- - circumvent bans using different accounts or sharing access with previously banned entities;
- - intentionally bypass model restrictions (e.g., jailbreaking, prompt injection) without authorization or circumvent rate limits or other use limitations, including by orchestrating usage among multiple accounts;
- - use inputs/outputs to train or improve an AI model without authorization ("model scraping" or "model distillation");
### **d. Engage or Promote Illegal or Harmful Activities**
- - engage in or promote any illegal activity such as terrorism; cybersecurity crime; organized crime; or child sexual exploitation, generation of Child Sexual Abuse Material (CSAM); prostitution, trafficking, or acquisition of illegal/controlled substances;
- - create, distribute, or facilitate sexually explicit content, including bestiality, incest, or depictions of sex acts/fetishes;
- - produce/modify/design/acquire weapons, explosives, or hazardous materials;
- - circumvent regulatory controls or synthesize high-yield weapons or counter-measure-evading materials;
- - compromise or disrupt critical infrastructure;
- - gain to attempt to gain unauthorized access to critical systems;
- - interfere with military infrastructure;
- - develop, promote, or sell fraudulent/deceptive products, payday/title loans, abusive debt collection practices;
- - Engage in or facilitate real money gambling;
### **e. Engage in Deceptive Conduct**
- - generate deceptive or misleading content such as fake reviews, comments, or media, or create/deploy conspiratorial narratives targeting certain individuals/entities;
- - impersonate real entities or create fake personas to mislead or deceive, such as to create, use, or distribute falsified documents (including fake IDs, licenses, currency, or government documents);
- - attempt to defraud, deceive, impersonate, or misrepresent your affiliation with any person or entity;
- - engage in or facilitate academic dishonesty, such as plagiarism or submitting AI-assisted work without attribution/permission;
- - engage in multi-level marketing, pyramid, or deceptive business models;
- - deploy subliminal, manipulative, or deceptive techniques to distort behavior;
### **f. Incite Harm or Discrimination, or Exploit Vulnerable Populations**
- - incite, facilitate, or promote violence, extremism, terrorism, hatred, or hateful behavior
- - spread false, misleading, or harmful information;
- - promote harm or injury of any person or self-harm, including self-injury or suicide;
- - exploit any of the vulnerabilities of a person (e.g., age, disability, or socio-economic situation);
- - engage in dangerous, fraudulent, abusive, or predatory practices;
- - engages in the unauthorized practice of any regulated profession, including the financial, legal, or medical/health professions;
- - facilitate/promote discriminatory practices against protected attributes;
- - harass, intimidate, shame, humiliate, bully, or celebrate suffering;
- - generate or spread animal cruelty content.
### **g. Fail to Disclose AI Involvement or Related Risks**
- - fail to disclose that information or recommendations were informed or generated by AI when necessary or reasonable to mitigate risks.
- - fail to communicate any known limitations or risks associated with reliance on AI-generated outputs.
- - misrepresent AI-generated content as human-authored, or remove or conceal any disclosures or indicators that the content was generated by AI
## **2. Prohibited Use Cases**
In addition to the above general use restrictions, when using our products or services, the following use cases are prohibited:
### **Interference in Elections or Surveillance; Impair Civil Rights**
- - interfere in political campaigns or election processes;
- - engage in surveillance: tracking, targeting or reporting on identity, facial recognition, covert tracking, battlefield management, predictive policing;
- - generate/distribute political campaign content designed to deceive;
- - disrupt electoral/civic processes;
- - assist or support censorship for government;
- - engage in emotional recognition without complying with applicable legal and regulatory requirements;
- - engage in law enforcement uses impairing civil rights/liberties.
### **Automated Scoring or Decision-Making**
- - assign social/behavioral “scores” to individuals (social scoring) without consent;
- - engage in criminal justice determinations (parole, sentencing);
- - make automated decisions about the eligibility of individuals for financial products and creditworthiness, or decisions regarding eligibility for housing, including leases and home loans;
- - make automated decisions about the employability of individuals or other employment determinations;
- - automate high-stakes decisions in other sensitive areas without human review:
- - critical infrastructure
- - education
- - insurance
- - legal
- - medical
- - essential government services
- - product safety components
- - national security
- - migration
- - law enforcement
### **Prohibited or Hazardous Applications**
- - any applications, practices, or use cases that are prohibited under applicable laws, such as those prohibited under the EU AI Act;
- - any use that is sensitive, critical, unsafe, high-risk, or hazardous (including any use that could result in death or serious bodily injury, catastrophic damage, warfare, or the operation of critical infrastructure);
- - facilitate the destruction or disruption of critical infrastructure such as power grids, water treatment facilities, medical devices, telecommunication networks, or air traffic control systems;
- - any applications, practices, or use cases that would result in our AI models and related products being declared a high-risk AI system or that otherwise qualifies as “high-risk” under the EU AI Act.
## **3. High-Risk Use Case Requirements**
If you are using or deploying our products and services as part of providing **_legal, medical, or financial_** **_advice or other professional services_** to consumers, we require that you implement the additional safety measures listed below:
- - **Human-in-the-loop**: You must ensure that the final decision complies with all applicable laws related to such use, including any requirements for human review, special audits and testing, consent, notice, or disclosure. For example, any content that is provided to your end users or customers must be reviewed by a qualified professional in that field prior to dissemination, and you are responsible for the accuracy and appropriateness of that information.
- - **Disclosure**: you must disclose to your end users or customers that you are using our services to help inform your decisions or recommendations, and appropriately disclose to your end users or customers any known risks or dangers of your use of our services.
- - **Transparency**: you may not misrepresent the origin of any response or output from our AI model or related product by claiming or implying such output was created by a human, and you may not remove any markings that are automatically applied to an output to indicate that such output was artificially generated.
## **4. General Terms**
We will update this AUP as our technology and the associated risks evolve, or as we learn about unanticipated risks from our users. We will endeavor to provide advance notice of any material updates to you (which may be provided through our products or services that you use or by posting an updated version of this AUP on our website). Continuing to use our products after such updates means you accept the revised terms. This AUP supplements any agreement that governs your use of Parallel’s products and services. In the event of any conflict between such agreement and this AUP, this AUP shall prevail with respect to the subject matter covered hereunder, unless otherwise mutually agreed by you and Parallel in the applicable agreement between us.