Acceptable Use Policy
What you may and may not do with Jettson, including specific rules for autonomous AI agents.
Last updated: May 15, 2026 · Version 1.0
This Acceptable Use Policy (the "AUP") defines what is and is not allowed when you use Jettson.dev. The AUP is incorporated into the Terms of Service. Violations are grounds for immediate suspension or termination, may result in forfeit of fees paid, and in serious cases may be reported to law enforcement.
You are responsible for everything an agent does on your behalf. "You did not intend that" is not a defense.
1. You may not use Jettson to
Illegal activity
- Violate any law, regulation, or court order (federal, state, local, or international).
- Violate U.S. export controls or sanctions, including dealings with sanctioned persons, entities, or jurisdictions on the OFAC list.
Intellectual property
- Infringe a third party's copyright, trademark, patent, trade secret, or other right.
- Strip or alter attribution required by an upstream license.
Spam, fraud, and deception
- Send spam, phishing, scams, unsolicited bulk communications, or chain messages.
- Run any form of financial fraud, market manipulation, or unauthorized trading.
- Conduct deceptive marketing, fake-review generation, or impersonation of an individual or organization.
Security
- Distribute or generate malware, viruses, ransomware, exploits, or rootkits.
- Conduct DDoS or other attacks against any system.
- Probe, scan, or test the vulnerability of any system without authorization.
- Bypass authentication, paywalls, or other access controls without authorization.
- Scrape any site in violation of its Terms of Service or robots.txt.
- Circumvent CAPTCHAs or anti-bot measures on third-party services in violation of those services' terms.
- Reverse-engineer, decompile, or otherwise attempt to extract Jettson's proprietary infrastructure, model weights, or internal prompts.
Harm
- Generate, distribute, or solicit child sexual abuse material (CSAM) or any content that sexualizes minors. This results in immediate termination and a report to the National Center for Missing & Exploited Children and law enforcement.
- Generate non-consensual intimate imagery of any kind.
- Generate content inciting violence, terrorism, or genocide.
- Generate content promoting or instructing self-harm or suicide.
- Generate election misinformation or impersonate public figures for political manipulation.
- Use Jettson for surveillance, stalking, harassment, or doxxing.
- Generate content intended to defame, threaten, or extort any person.
Agent-specific prohibitions
- Operate agents that impersonate humans in contexts where disclosure of AI use is legally required.
- Use agents to evaluate creditworthiness, employment eligibility, insurance eligibility, housing access, or other legally consequential decisions about individuals without proper human review.
- Use agents in any manner that bypasses required disclosures, accessibility laws, or consumer protection laws.
- Use Jettson to deliver autonomous medical, legal, or financial advice represented as professional advice.
Regulated data
- Process protected health information (PHI) covered by HIPAA without a fully executed Business Associate Agreement with Jettson (none is currently available).
- Process cardholder data (PCI) outside the Stripe flows we provide.
- Process biometric identifiers, government identifiers, or children's data without specific prior written approval from Jettson.
Commercial misuse
- Resell or sublicense the Service without a written reseller agreement with Jettson.
- Train competing AI models on Jettson outputs, prompts, telemetry, or infrastructure characteristics without our written permission.
- Operate a service that competes with Jettson on top of the Jettson API as the substantial backbone.
Infrastructure abuse
- Use Free Tier accounts to evade quotas or rate limits via account multiplication.
- Run sustained workloads on the Service designed to harm capacity for other users.
- Use Jettson as a proxy to mask the origin of requests in violation of any law or third-party policy.
2. Reporting violations
To report a violation, email customertek@rwxtek.com. Include: the Account identifier (if known), URLs or evidence, your contact information, and a description of the harm.
For DMCA-specific takedowns see the DMCA / Copyright Policy.
3. Our right to investigate
We may review agent activity, logs, prompts, and outputs when reasonably necessary to enforce this AUP, comply with law, or protect the Service and its users. We will not browse user Content without cause. Where we conduct a review we will limit its scope to what is necessary.
4. Consequences of violations
Depending on severity, consequences may include:
- Warning with a request to cure the violation.
- Throttling or feature restriction while we investigate.
- Suspension of the Account.
- Termination of the Account without refund.
- Legal action for damages.
- Referral to law enforcement for criminal conduct, particularly CSAM, financial fraud, or threats of violence.
We may take any of these actions without notice when waiting would expose users or third parties to harm.
5. Government and security research
Bona-fide security research is welcome under the safe-harbor terms in the Security Overview. Coordinated disclosure to customertek@rwxtek.com will not be treated as an AUP violation.
6. Contact
Questions about this AUP: customertek@rwxtek.com.