Acceptable Use Policy
Last modification date: September 2025
In order to provide our Users with the best possible experience when using Whoz solution, it is imperative that the Services operate smoothly, efficiently, and without any interruptions. Furthermore, Whoz is committed to protecting clients, staff, and third parties from illegal or damaging actions by individuals, either knowingly or unknowingly. To ensure this, we require assistance from Users to refrain from misusing or abusing the Services.
We define, but not limiting to, what we mean by misuse or abuse in this Acceptable Use Policy (the “Policy”) in order to allow us to identify and respond appropriately to such behaviors.
If you violate this Policy, in addition to any other remedies that may be available to us, we may suspend or terminate your use of the Services if we believe that suspension or termination is necessary to ensure compliance with laws or to protect the rights, safety, privacy, security or property of Whoz, its clients, staff or third parties.
If you become aware of any violation of this Policy, you must immediately notify us by email at compliance@whoz.com and provide us with assistance, as requested, to stop or remedy the violation.
The definition of Content herein encompasses two types of materials: (1) anything you share, post, submit, upload, or otherwise provide in any way to the Services, including but not limited to information, data, text, software, code, scripts, music, sound, photos, graphics, videos, messages, tags, and interactive features, and (2) any other materials, content, or data that you use with the Services.
The following is a list of actions that we strictly prohibit:
Wrongful activities
- Engaging in any form of misrepresentation, including but not limited to spoofing, phishing, impersonating others, or manipulating headers or other identifiers to disguise the origin of any Content. This also includes falsely implying any sponsorship or association with Whoz or any third party.
- Engaging in activities that invade the privacy of others, such as disclosing or sharing confidential information of other individuals without their explicit consent, or gathering personal information of other individuals (including their account names or details) from the Services.
- Engaging in stalking, harassment, or making explicit threats of violence against others using the Services.
- Engaging in any unlawful activity, or using the Services or its Technologies in a manner that contravenes any applicable laws or regulations (including, without limitation, those related to data protection, privacy, artificial intelligence, and the control of exports), or in a manner that promotes or results in discriminatory practices against individuals or groups based on race, ethnicity, national origin, religion, sex, gender, sexual orientation, disability, medical condition, or any other protected characteristic.
- Using any method other than the publicly supported interfaces (such as robot, spider, site search/retrieval application) to retrieve, index, “scrape,” “data mine,” or in any way gather any messages, text, files, images, photos, video, sounds, profiles, works of authorship, or any other content from the Services or reproduce or circumvent the navigational structure or presentation of the Services.
- Reverse engineering, decompiling, disassembling or otherwise attempting to discover the object code, source code or underlying ideas or algorithms of the Services.
- Using the access to the Services in order to: (1) build a competitive product or service, (2) make or have made a product using similar ideas, features, functions or graphics of the Service, or (3) copy any features, functions or graphics of the Services.
- Framing or mirroring the Services.
- Modifying, translating, or creating derivative works based on or inspired after any element of the Services or Documentation.
- Using the Services in any situation where failure or fault of the Services could lead to death or serious bodily injury of any person, or to physical or environmental damage.
- Using the Services for any purpose or in any manner other than in accordance with the Documentation.
Inappropriate communications
- Requesting or contacting Users for commercial purposes.
- Sending spam, advertising, chain letters, or other unsolicited Content through the Services.
- Disparaging Whoz or its partners, vendors, or affiliates.
- Advertising or promoting other products or services without proper authorization.
Inappropriate content
Posting, uploading, sharing, submitting, distributing, or providing Content on the Services that violates any of the following terms is prohibited:
- Infringes, dilutes, misappropriates or otherwise violates any intellectual property or other rights of Whoz or any third party.
- You do not have the right to submit.
- Is deceptive, fraudulent, illegal, obscene, defamatory, libellous, threatening, harmful to minors, pornographic, indecent, harassing, hateful, or otherwise inappropriate.
- Encourages or furthers conduct that would violate any applicable laws, including any criminal laws, or any third-party rights, including publicity or privacy rights.
- Attacks or advocates discrimination against individuals or groups based on their race, ethnicity, national origin, religion, sex, gender, sexual orientation, disability, or medical condition.
- Contains malicious code such as viruses, bots, worms, Trojan horses, scripting exploits, time bombs or other similar materials.
- Could cause damage to Whoz or any third party in any way.
AI-Specific Restrictions
- Using AI Features to generate or disseminate Content that could reasonably be expected to mislead, cause harm, or create legal, regulatory, or reputational risk for Whoz.
- Using AI Features or output to train, develop, or improve any competing artificial intelligence models, services, or datasets, except as expressly authorized in writing by Whoz.
- Attempting to disable, bypass, or otherwise interfere with safeguards, monitoring tools, or integrity measures implemented by Whoz in relation to AI Features.
- Extracting data or output from AI Features through automated means (including scraping, harvesting, or similar techniques).
- Using AI Features or output in safety-critical or high-risk environments (including but not limited to healthcare, aviation, nuclear, or life-support systems) where failure of the output could reasonably be expected to cause death, personal injury, or severe environmental damage.
Disruption
- Compromising the integrity of the systems, which includes any attempts to probe, scan, or test the vulnerability of any system or network that hosts the Services (unless expressly permitted by Whoz).
- Tampering with, reverse-engineering, or hacking the Services, bypassing security or authentication measures, or trying to gain unauthorized access to the Services, related systems, networks, or data.
- Modifying, disabling, or compromising the integrity or performance of the Services or any related systems, network, or data.
- Intercepting or decoding any transmissions to or from the servers that run the Services.
- Overwhelming the infrastructure by imposing an unreasonably large load on the systems, including but not limited to:
- Using automated systems such as robots to send more request messages than a human could reasonably send in the same period of time with a normal browser.
- Using our APIs in a manner that would negatively impact our services or infrastructure, or that would cause harm or disruption to our Users.
- Consuming an unreasonable amount of storage for music, videos, pictures, or any other Content unrelated to the purposes for which the Services were designed.
- Exceeding the maximum number of requests, queries, or API calls permitted by the Services or its technical documentation, or attempting to bypass safeguards such as throttling, rate limits, or other performance-protection mechanisms.
- Invoking repeatedly AI Features at a scale inconsistent with the intended use cases of the Services or the agreed commercial terms.
Whoz reserves the right to throttle, restrict, suspend, or terminate access to the Services if usage materially exceeds permitted limits, or if such usage threatens the stability, performance, or security of the Services.
We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Services. We may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Such reporting may include disclosing appropriate customer data. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.
Comments
0 comments
Article is closed for comments.