Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy

Last Updated: January 25, 2026

Acceptable Use Policy - Fulltime Solutions Inc.

2. Business Use Only

Except as expressly permitted under an Evaluation Service or Pilot Period, the Services are designed exclusively for legitimate business purposes.

2.1 Your Organization's Responsibilities

Ensure all users comply with this AUP

Implement appropriate access controls and security measures

Monitor usage and investigate potential violations

Maintain internal policies aligned with this AUP

2.2 Your Individual Responsibilities

Use the Services only for authorized business purposes

Follow your organization's policies

Protect your login credentials

Report suspected violations or security issues promptly

3. What You Can Do

Appropriate business uses include:

Conducting day-to-day business operations and workflows

Collaborating with colleagues and authorized partners

Analyzing business data and generating insights

Creating business documents, reports, and presentations

Automating business processes

Integrating with other authorized business systems

Using AI to support business decisions (with human oversight)

4. What You Cannot Do

4.1 Illegal or Non-Compliant Activities

Never use the Services to:

Violate federal, state, or provincial laws

Infringe intellectual property rights (copyrights, patents, trademarks, trade secrets)

Breach contracts or confidentiality agreements

Violate data privacy laws (GDPR, CCPA, PIPEDA, etc.)

Commit fraud or financial crimes

Violate securities regulations or engage in insider trading

Breach industry regulations

Violate export controls or US/Canadian sanctions

4.2 Misuse of AI Features

Do Not:

High-Risk Decisions Without Human Oversight:

Make automated hiring, firing, or promotion decisions

Approve or deny credit, loans, or insurance applications

Generate binding legal advice or contracts without attorney review

Make medical diagnoses or treatment recommendations without physician oversight

Make any automated decision with significant legal or financial effects on individuals

Theft of Our Technology:

Reverse engineer or extract our AI models or algorithms

Train competing AI systems using our outputs

Systematically extract data to build competing products

Benchmark our AI to develop competitive offerings

Deceptive or Harmful Content:

Generate fake reviews, testimonials, or endorsements

Create deepfakes or synthetic media without clear disclosure

Produce misleading financial reports or business records

Generate misinformation or propaganda campaigns

Create fake business credentials or certifications

4.3 Security Violations

Do Not:

Access data, systems, or accounts you're not authorized to access

Share your login credentials Introduce malware, viruses, or malicious code

Conduct denial-of-service attacks or probe for vulnerabilities

Attempt to bypass security controls or usage limits

Scrape data using automated tools

Interfere with service operations or other users

4.4 Competitive Activities

Do Not:

Use the Services to develop directly competing products

Extract our intellectual property or trade secrets

Copy our features or functionality for competitive purposes

Conduct unauthorized competitive intelligence gathering

4.5 Prohibited Content

Do Not create, store, or transmit:

Content promoting violence, terrorism, or illegal activity

Hate speech or discriminatory content

Content that exploits or harms minors

Harassment, threats, or intimidation

Spam or phishing attempts

Pirated or illegal materials

5. Data Handling Requirements

5.1 What You Input

You must:

Have proper rights and authorization for all data you input

Not input third-party confidential information without permission

Comply with all applicable privacy laws

Follow your organization's data classification policies

5.2 What AI Outputs

You must:

Review and validate AI outputs before use in important decisions

Not present AI outputs as definitive without verification

Disclose use of AI when appropriate or required

Take full responsibility for any outputs you use or distribute

Understand that AI can produce inaccurate or biased results

6. Compliance with US and Canadian Laws

6.1 Privacy and Data Protection

You must comply with:

US: Federal privacy laws, state laws (CCPA, Virginia CDPA, Colorado CPA, etc.)

Canada: PIPEDA and provincial privacy legislation

Sector-Specific: HIPAA (healthcare), GLBA (financial), FERPA (education), COPPA (children's data)

6.2 AI and Algorithmic Accountability

Comply with emerging AI regulations:

US federal AI guidance and Executive Orders

State AI laws (California, Colorado, Illinois, etc.)

Canadian AI and data strategy requirements

Algorithmic fairness and transparency requirements

Employment, housing, and credit-related AI regulations

6.3 Export Controls

Do not use the Services:

In sanctioned countries (Cuba, Iran, North Korea, Syria, Crimea region)

For parties on restricted entity lists

For weapons development

In violation of ITAR or EAR regulations

7. Organizational Governance

7.1 Access Controls

Your organization should:

Grant access only to authorized personnel

Implement role-based access controls

Review access permissions regularly

Revoke access immediately upon employee termination

7.2 Security Practices

Implement these security measures:

Multi-factor authentication where available

Strong password policies

Security awareness training

Regular security assessments

Incident response procedures

7.3 Internal Policies

Establish policies for:

Acceptable use specific to your business

Data classification and handling

AI output review and approval workflows

Incident reporting

Disciplinary actions for violations

8. Enforcement

8.1 Actions We May Take

Depending on severity:

Warnings and Restrictions:

Issue formal warnings

Require corrective action

Restrict access to certain features

Impose usage limitations

Suspension and Termination:

Suspend user accounts

Temporarily suspend organizational access

Permanently terminate access

Legal Actions:

Where required by law or reasonably necessary to protect Fulltime, its customers, or third parties, we may report certain activities to law enforcement or regulatory authorities.

8.2 No Monitoring Obligation

We have no duty to monitor use but may do so for security, compliance, legal obligations, and service improvement. We may use automated detection systems.

9. Changes to This Policy

We may update this AUP to address new regulations, security threats, or AI capabilities. Material changes will be communicated to Customers at least 30 days in advance.

Continued use after changes constitutes acceptance of the updated AUP.

Get started

Start automating your calls today

Your 24/7 receptionist

Fulltime

7405 Rte Transcanadienne, 2nd Floor
Saint-Laurent, QC H4T 1Z2

© 2025 Manos Software Group | Fulltime

Get started

Start automating your calls today

Your 24/7 receptionist

Fulltime

7405 Rte Transcanadienne, 2nd Floor
Saint-Laurent, QC H4T 1Z2

© 2025 Manos Software Group | Fulltime

Get started

Start automating your calls today

Your 24/7 receptionist

Fulltime

7405 Rte Transcanadienne, 2nd Floor
Saint-Laurent, QC H4T 1Z2

© 2025 Manos Software Group | Fulltime