Acceptable Use Policy
Last Updated: January 25, 2026
Acceptable Use Policy - Fulltime Solutions Inc.
2. Business Use Only
Except as expressly permitted under an Evaluation Service or Pilot Period, the Services are designed exclusively for legitimate business purposes.
2.1 Your Organization's Responsibilities
Ensure all users comply with this AUP
Implement appropriate access controls and security measures
Monitor usage and investigate potential violations
Maintain internal policies aligned with this AUP
2.2 Your Individual Responsibilities
Use the Services only for authorized business purposes
Follow your organization's policies
Protect your login credentials
Report suspected violations or security issues promptly
3. What You Can Do
Appropriate business uses include:
Conducting day-to-day business operations and workflows
Collaborating with colleagues and authorized partners
Analyzing business data and generating insights
Creating business documents, reports, and presentations
Automating business processes
Integrating with other authorized business systems
Using AI to support business decisions (with human oversight)
4. What You Cannot Do
4.1 Illegal or Non-Compliant Activities
Never use the Services to:
Violate federal, state, or provincial laws
Infringe intellectual property rights (copyrights, patents, trademarks, trade secrets)
Breach contracts or confidentiality agreements
Violate data privacy laws (GDPR, CCPA, PIPEDA, etc.)
Commit fraud or financial crimes
Violate securities regulations or engage in insider trading
Breach industry regulations
Violate export controls or US/Canadian sanctions
4.2 Misuse of AI Features
Do Not:
High-Risk Decisions Without Human Oversight:
Make automated hiring, firing, or promotion decisions
Approve or deny credit, loans, or insurance applications
Generate binding legal advice or contracts without attorney review
Make medical diagnoses or treatment recommendations without physician oversight
Make any automated decision with significant legal or financial effects on individuals
Theft of Our Technology:
Reverse engineer or extract our AI models or algorithms
Train competing AI systems using our outputs
Systematically extract data to build competing products
Benchmark our AI to develop competitive offerings
Deceptive or Harmful Content:
Generate fake reviews, testimonials, or endorsements
Create deepfakes or synthetic media without clear disclosure
Produce misleading financial reports or business records
Generate misinformation or propaganda campaigns
Create fake business credentials or certifications
4.3 Security Violations
Do Not:
Access data, systems, or accounts you're not authorized to access
Share your login credentials Introduce malware, viruses, or malicious code
Conduct denial-of-service attacks or probe for vulnerabilities
Attempt to bypass security controls or usage limits
Scrape data using automated tools
Interfere with service operations or other users
4.4 Competitive Activities
Do Not:
Use the Services to develop directly competing products
Extract our intellectual property or trade secrets
Copy our features or functionality for competitive purposes
Conduct unauthorized competitive intelligence gathering
4.5 Prohibited Content
Do Not create, store, or transmit:
Content promoting violence, terrorism, or illegal activity
Hate speech or discriminatory content
Content that exploits or harms minors
Harassment, threats, or intimidation
Spam or phishing attempts
Pirated or illegal materials
5. Data Handling Requirements
5.1 What You Input
You must:
Have proper rights and authorization for all data you input
Not input third-party confidential information without permission
Comply with all applicable privacy laws
Follow your organization's data classification policies
5.2 What AI Outputs
You must:
Review and validate AI outputs before use in important decisions
Not present AI outputs as definitive without verification
Disclose use of AI when appropriate or required
Take full responsibility for any outputs you use or distribute
Understand that AI can produce inaccurate or biased results
6. Compliance with US and Canadian Laws
6.1 Privacy and Data Protection
You must comply with:
US: Federal privacy laws, state laws (CCPA, Virginia CDPA, Colorado CPA, etc.)
Canada: PIPEDA and provincial privacy legislation
Sector-Specific: HIPAA (healthcare), GLBA (financial), FERPA (education), COPPA (children's data)
6.2 AI and Algorithmic Accountability
Comply with emerging AI regulations:
US federal AI guidance and Executive Orders
State AI laws (California, Colorado, Illinois, etc.)
Canadian AI and data strategy requirements
Algorithmic fairness and transparency requirements
Employment, housing, and credit-related AI regulations
6.3 Export Controls
Do not use the Services:
In sanctioned countries (Cuba, Iran, North Korea, Syria, Crimea region)
For parties on restricted entity lists
For weapons development
In violation of ITAR or EAR regulations
7. Organizational Governance
7.1 Access Controls
Your organization should:
Grant access only to authorized personnel
Implement role-based access controls
Review access permissions regularly
Revoke access immediately upon employee termination
7.2 Security Practices
Implement these security measures:
Multi-factor authentication where available
Strong password policies
Security awareness training
Regular security assessments
Incident response procedures
7.3 Internal Policies
Establish policies for:
Acceptable use specific to your business
Data classification and handling
AI output review and approval workflows
Incident reporting
Disciplinary actions for violations
8. Enforcement
8.1 Actions We May Take
Depending on severity:
Warnings and Restrictions:
Issue formal warnings
Require corrective action
Restrict access to certain features
Impose usage limitations
Suspension and Termination:
Suspend user accounts
Temporarily suspend organizational access
Permanently terminate access
Legal Actions:
Where required by law or reasonably necessary to protect Fulltime, its customers, or third parties, we may report certain activities to law enforcement or regulatory authorities.
8.2 No Monitoring Obligation
We have no duty to monitor use but may do so for security, compliance, legal obligations, and service improvement. We may use automated detection systems.
9. Changes to This Policy
We may update this AUP to address new regulations, security threats, or AI capabilities. Material changes will be communicated to Customers at least 30 days in advance.
Continued use after changes constitutes acceptance of the updated AUP.