We aim for our tools to be used safely and responsibly, while
maximizing your control over how you use them. In building our
Usage Policies, we keep a few important things in mind.
-
We empower users to innovate with AI. We
build AI products that maximize helpfulness and freedom,
while ensuring safety. Usage Policies are one way we set
expectations for use of our products within a broader safety
ecosystem. Responsible use is a shared priority. Our terms
and policies set a reasonable bar for acceptable use. Our
rules are no substitute for legal requirements, professional
duties, or ethical obligations. Breaking or circumventing
safeguards may mean you lose access to our systems or face
other penalties.
-
We build with safety first. We monitor and
enforce policies with privacy safeguards in place and clear
review processes.
-
We update as we learn. People are using our
systems in new ways every day, and we update our rules to
ensure they are not overly restrictive or to better protect
users. We reserve all rights to withhold access where we
reasonably believe it necessary to protect our service,
users, or anyone else.
Your use of IntelliMate services must follow these Usage
Policies:
Protect people
Everyone has a right to safety and security. You cannot use
our services for:
- Threats, intimidation, harassment, or defamation
-
Suicide, self-harm, or disordered eating promotion or
facilitation
- Sexual violence or non-consensual intimate content
- Terrorism or violence, including hate-based violence
-
Weapons development, procurement, or use, including
conventional weapons or CBRNE
- Illicit activities, goods, or services
-
Destruction, compromise, or breach of another’s system or
property, including malicious or abusive cyber activity or
attempts to infringe on intellectual property rights of
others
- Real money gambling
-
Provision of tailored advice that requires a license, such
as legal or medical advice, without appropriate involvement
by a licensed professional
- Unsolicited safety testing
- Circumventing our safeguards
-
National security or intelligence purposes without our
review and approval
Respect privacy
People are entitled to privacy. We don’t allow attempts to
compromise the privacy of others, including to aggregate,
monitor, profile, or distribute individuals’ private or
sensitive information without authorization. You may never use
our services for:
-
Facial recognition databases without data subject consent
-
Real-time remote biometric identification in public spaces
-
Use of someone’s likeness (including photorealistic image or
voice) without consent in ways that could confuse
authenticity
-
Evaluation or classification of individuals based on social
behavior, personal traits, or biometric data (including
social scoring, profiling, or inferring sensitive
attributes)
-
Inference regarding an individual’s emotions in the
workplace and educational settings, except when necessary
for medical or safety reasons
-
Assessment or prediction of the risk of an individual
committing a criminal offense based solely on personal
traits or profiling
Keep minors safe
Children and teens deserve special protection. Our services
must never be used to exploit, endanger, or sexualize anyone
under 18 years old. We report apparent child sexual abuse
material and child endangerment to the National Center for
Missing and Exploited Children. We prohibit use of our
services for:
-
Child sexual abuse material (CSAM), whether or not any
portion is AI generated
- Grooming of minors
-
Exposing minors to age-inappropriate content (graphic
self-harm, sexual, or violent content)
-
Promoting unhealthy dieting or exercise behavior to minors
-
Shaming or otherwise stigmatizing the body type or
appearance of minors
- Dangerous challenges for minors
- Underaged sexual or violent roleplay
-
Underaged access to age-restricted goods or activities
Empower people
People should be able to make decisions about their lives and
communities. We don’t allow use of our services to manipulate
or deceive people, interfere with the exercise of human
rights, exploit vulnerabilities, or interfere with access to
education or critical services. This includes any use for:
- Academic dishonesty
- Deceit, fraud, scams, spam, or impersonation
-
Political campaigning, lobbying, foreign or domestic
election interference, or demobilization activities
-
Automation of high-stakes decisions in sensitive areas
without human review, including:
- Critical infrastructure
- Education
- Housing
- Employment
- Financial activities and credit
- Insurance
- Legal
- Medical
- Essential government services
- Product safety components
- National security
- Migration
- Law enforcement