Skip to main content
Fulltime

Acceptable Use Policy

Last updated: 2026-02-25

Introduction

This Acceptable Use Policy ("AUP") governs use of the Services and is incorporated by reference into the Fulltime Solutions Inc. Terms of Service. Who This Applies To: Authorized business users accessing the Services through Customers on behalf of their organizations. Your Responsibility: You represent your organization when using the Services. Your actions may create liability for your employer. Both you and your organization must comply with this AUP. Consequences: Violations may result in immediate suspension or termination of access, notification to your organization and Customer, and potential legal consequences.

Business Use Only

Except as expressly permitted under an Evaluation Service or Pilot Period, the Services are designed exclusively for legitimate business purposes. 2.1 Your Organization's Responsibilities Ensure all users comply with this AUP Implement appropriate access controls and security measures Monitor usage and investigate potential violations Maintain internal policies aligned with this AUP 2.2 Your Individual Responsibilities Use the Services only for authorized business purposes Follow your organization's policies Protect your login credentials Report suspected violations or security issues promptly

What You Can Do

Appropriate business uses include: Conducting day-to-day business operations and workflows Collaborating with colleagues and authorized partners Analyzing business data and generating insights Creating business documents, reports, and presentations Automating business processes Integrating with other authorized business systems Using AI to support business decisions (with human oversight)

What You Cannot Do

4.1 Illegal or Non-Compliant Activities Never use the Services to: Violate federal, state, or provincial laws Infringe intellectual property rights (copyrights, patents, trademarks, trade secrets) Breach contracts or confidentiality agreements Violate data privacy laws (GDPR, CCPA, PIPEDA, etc.) Commit fraud or financial crimes Violate securities regulations or engage in insider trading Breach industry regulations Violate export controls or US/Canadian sanctions 4.2 Misuse of AI Features Do Not: High-Risk Decisions Without Human Oversight: Make automated hiring, firing, or promotion decisions Approve or deny credit, loans, or insurance applications Generate binding legal advice or contracts without attorney review Make medical diagnoses or treatment recommendations without physician oversight Make any automated decision with significant legal or financial effects on individuals Theft of Our Technology: Reverse engineer or extract our AI models or algorithms Train competing AI systems using our outputs Systematically extract data to build competing products Benchmark our AI to develop competitive offerings Deceptive or Harmful Content: Generate fake reviews, testimonials, or endorsements Create deepfakes or synthetic media without clear disclosure Produce misleading financial reports or business records Generate misinformation or propaganda campaigns Create fake business credentials or certifications 4.3 Security Violations Do Not: Access data, systems, or accounts you're not authorized to access Share your login credentials Introduce malware, viruses, or malicious code Conduct denial-of-service attacks or probe for vulnerabilities Attempt to bypass security controls or usage limits Scrape data using automated tools Interfere with service operations or other users 4.4 Competitive Activities Do Not: Use the Services to develop directly competing products Extract our intellectual property or trade secrets Copy our features or functionality for competitive purposes Conduct unauthorized competitive intelligence gathering 4.5 Prohibited Content Do Not create, store, or transmit: Content promoting violence, terrorism, or illegal activity Hate speech or discriminatory content Content that exploits or harms minors Harassment, threats, or intimidation Spam or phishing attempts Pirated or illegal materials

Data Handling Requirements

5.1 What You Input You must: Have proper rights and authorization for all data you input Not input third-party confidential information without permission Comply with all applicable privacy laws Follow your organization's data classification policies 5.2 What AI Outputs You must: Review and validate AI outputs before use in important decisions Not present AI outputs as definitive without verification Disclose use of AI when appropriate or required Take full responsibility for any outputs you use or distribute Understand that AI can produce inaccurate or biased results

Compliance with US and Canadian Laws

6.1 Privacy and Data Protection You must comply with: US: Federal privacy laws, state laws (CCPA, Virginia CDPA, Colorado CPA, etc.) Canada: PIPEDA and provincial privacy legislation Sector-Specific: HIPAA (healthcare), GLBA (financial), FERPA (education), COPPA (children's data) 6.2 AI and Algorithmic Accountability Comply with emerging AI regulations: US federal AI guidance and Executive Orders State AI laws (California, Colorado, Illinois, etc.) Canadian AI and data strategy requirements Algorithmic fairness and transparency requirements Employment, housing, and credit-related AI regulations 6.3 Export Controls Do not use the Services: In sanctioned countries (Cuba, Iran, North Korea, Syria, Crimea region) For parties on restricted entity lists For weapons development In violation of ITAR or EAR regulations

Organizational Governance

7.1 Access Controls Your organization should: Grant access only to authorized personnel Implement role-based access controls Review access permissions regularly Revoke access immediately upon employee termination 7.2 Security Practices Implement these security measures: Multi-factor authentication where available Strong password policies Security awareness training Regular security assessments Incident response procedures 7.3 Internal Policies Establish policies for: Acceptable use specific to your business Data classification and handling AI output review and approval workflows Incident reporting Disciplinary actions for violations

Enforcement

8.1 Actions We May Take Depending on severity: Warnings and Restrictions: Issue formal warnings Require corrective action Restrict access to certain features Impose usage limitations Suspension and Termination: Suspend user accounts Temporarily suspend organizational access Permanently terminate access Legal Actions: Where required by law or reasonably necessary to protect Fulltime, its customers, or third parties, we may report certain activities to law enforcement or regulatory authorities. 8.2 No Monitoring Obligation We have no duty to monitor use but may do so for security, compliance, legal obligations, and service improvement. We may use automated detection systems.

Changes to This Policy

We may update this AUP to address new regulations, security threats, or AI capabilities. Material changes will be communicated to Customers at least 30 days in advance. Continued use after changes constitutes acceptance of the updated AUP.

We use cookies to analyze site traffic and improve your experience. Read our privacy policy