Acceptable Use Policy for SearchWell
Effective Date: July 20, 2025
This Acceptable Use Policy ("AUP") is part of our Terms of Service and sets forth the rules and guidelines for using SearchWell's digital asset search platform. By using our Service, you agree to comply with this policy.
1. Prohibited Content
1.1 Illegal Content
- Violates any applicable local, state, national, or international law
- Contains child pornography or sexually exploitative material
- Promotes terrorism, violence, or illegal activities
- Contains instructions for illegal activities or weapons manufacture
- Violates export control laws or trade sanctions
1.2 Copyright and Intellectual Property Violations
- Infringes on copyrights, trademarks, patents, or trade secrets
- Contains material you do not have the right to use or distribute
- Includes pirated software, music, videos, or other media
- Violates the intellectual property rights of third parties
- Contains unauthorized reproductions of copyrighted works
1.3 Harmful or Malicious Content
- Contains malware, viruses, trojans, or other malicious code
- Attempts to exploit security vulnerabilities
- Contains phishing attempts or fraudulent materials
- Includes spam, unsolicited commercial content, or deceptive practices
- Contains content designed to harm systems or networks
1.4 Offensive or Inappropriate Content
- Contains hate speech, discrimination, or harassment
- Promotes violence, self-harm, or dangerous activities
- Contains graphic violence, gore, or disturbing imagery
- Includes sexually explicit content not related to legitimate business use
- Contains content that could cause emotional distress
2. Prohibited Activities
2.1 System Abuse and Security Violations
- Attempt to gain unauthorized access to our systems or other users' data
- Use automated tools to abuse our processing limits or API endpoints
- Perform denial-of-service attacks or disrupt service availability
- Reverse engineer, decompile, or attempt to extract our source code
- Bypass security measures or authentication systems
- Use our Service to attack other systems or networks
2.2 Resource Abuse
- Exceed reasonable usage limits or attempt to circumvent quotas
- Upload files that are unnecessarily large or numerous for testing purposes
- Create multiple accounts to avoid processing limits
- Use our Service for bulk processing of third-party content without authorization
- Perform systematic scraping or data extraction from our platform
- Use our Service for cryptocurrency mining or similar resource-intensive tasks
2.3 Misrepresentation and Fraud
- Impersonate others or create false identities
- Provide false information during account registration
- Use our Service to facilitate fraud or deceptive practices
- Create accounts for the purpose of evading bans or restrictions
- Misrepresent your relationship with content you upload
2.4 Commercial Misuse
- Use our Service to process content for unauthorized third parties
- Resell or redistribute our Service without authorization
- Use our Service for commercial purposes not covered by your subscription
- Process content that violates your own terms of service or agreements
- Use our Service to compete with us or create competing services
3. Content Processing Guidelines
3.1 Legitimate Use Requirements
- Have the legal right to process and store the content
- Ensure content is relevant to your legitimate business needs
- Comply with any applicable data protection or privacy laws
- Respect the intellectual property rights of content creators
- Use appropriate file formats and sizes for processing
3.2 Data Protection Compliance
- Personal data in your content is processed lawfully
- You have appropriate consent for processing personal information
- Sensitive data is handled according to applicable regulations
- You comply with GDPR, CCPA, or other relevant privacy laws
- Data retention and deletion practices are appropriate
3.3 Workspace and Company Management
- Maintain accurate company and workspace information
- Ensure only authorized users have access to your workspace
- Monitor and control access to sensitive company assets
- Report unauthorized access or suspicious activity
- Maintain appropriate security practices for your account
4. Technical Usage Restrictions
4.1 API and Integration Limits
- Exceed published API rate limits or quotas
- Use our APIs for unauthorized commercial purposes
- Create integrations that violate third-party terms of service
- Use our Service as a backend for competing search platforms
- Automate account creation or workspace setup
4.2 Processing and Storage Abuse
- Upload files solely for storage purposes without search intent
- Use our Service as a general file hosting platform
- Process content that could be handled by standard file systems
- Upload duplicate or near-duplicate content repeatedly
- Use our Service for backup or archival purposes not related to search
4.3 Search and Analytics Misuse
- Use search results to violate privacy or confidentiality
- Perform systematic analysis of other users' content patterns
- Use our Service for surveillance or monitoring without consent
- Extract metadata or analytics for unauthorized purposes
- Use search functionality to circumvent access controls
5. Reporting and Enforcement
5.1 Reporting Violations
- Report it immediately through our support channels
- Provide specific details about the violation
- Include relevant file names, user information, or timestamps
- Do not attempt to investigate or confront violators yourself
5.2 Investigation Process
- Review reported violations promptly and thoroughly
- Investigate using available technical and user information
- Contact users when appropriate for clarification
- Take action based on the severity and nature of violations
- Maintain confidentiality during investigations
5.3 Enforcement Actions
- Warning: First-time minor violations
- Temporary Suspension: Repeated or moderate violations
- Account Termination: Serious or repeated violations
- Legal Action: Criminal activity or severe violations
- Content Removal: Immediate removal of violating content
5.4 Appeal Process
- Contact us within 30 days of the action
- Provide evidence supporting your appeal
- We will review and respond within 14 days
- Final decisions are at our sole discretion
6. Monitoring and Detection
6.1 Automated Monitoring
- Detect unusual usage patterns and potential abuse
- Monitor processing limits and resource consumption
- Identify potentially harmful or malicious content
- Flag suspicious account activity or behavior
- Prevent system overload and service degradation
6.2 Manual Review
- Reported violations and user complaints
- Unusual usage patterns or account behavior
- Content flagged by automated systems
- Security incidents or potential threats
- Compliance with legal or regulatory requirements
6.3 Data Retention for Enforcement
- Logs of user activity for security and enforcement purposes
- Copies of violating content for investigation and legal compliance
- Account information for enforcement and appeal processes
- Technical data related to violations and investigations
7. Legal Compliance
7.1 Applicable Laws
- Copyright and intellectual property laws
- Data protection and privacy regulations
- Computer fraud and abuse laws
- Export control and trade regulations
- Industry-specific regulations and standards
7.2 Cooperation with Authorities
- Respond to valid legal requests from law enforcement
- Provide information as required by court orders or subpoenas
- Cooperate with investigations of illegal activity
- Preserve evidence as required by legal proceedings
- Report suspected criminal activity to appropriate authorities
7.3 International Compliance
- Laws applicable to their jurisdiction
- International trade and export regulations
- Cross-border data transfer requirements
- Industry-specific compliance standards
- Local content and speech regulations
8. Updates to This Policy
8.1 Policy Changes
- Address new types of abuse or violations
- Comply with changing legal requirements
- Improve enforcement and detection capabilities
- Clarify existing rules and guidelines
- Respond to emerging threats or risks
8.2 Notification of Changes
- Material changes will be communicated via email
- Updates will be posted on our website
- Continued use constitutes acceptance of changes
- Users may terminate accounts if they disagree with changes
9. Contact Information
For questions about this Acceptable Use Policy or to report violations:
SearchWell Labs LLC
Email: jameson@searchwell.io
Support: Available through our website