This Acceptable Use Policy ("AUP") sets forth the requirements and restrictions governing access to and use of products and services provided by For Good AI Inc. dba Zencoder Inc. ("For Good", "We", "Us" or "Our"), including the Zencoder hosted platform and the Zenflow Desktop Application (collectively, the "Services"). The Services may be governed by terms provided: (i) directly under Our Zencoder Terms of Service; (ii) under Our Zenflow Terms of Service; (iii) pursuant to a separate enterprise master agreement or similar contract executed between For Good and a Customer entity ("Enterprise Agreement"); or (iv) in accordance with terms made available to the Customer via an authorized reseller, channel partner, or other third party (each an "Authorized Provider"). All such applicable terms and conditions (collectively, the "Governing Terms") are incorporated by reference into this AUP. In the event of any conflict between this AUP and the Governing Terms, the more restrictive provision shall control. By accessing or using the Services, all end users (collectively, "Users") are deemed to have accepted and agree to comply with this AUP. For clarity, "Service Input" and "Service Output" as used in this AUP correspond to "Input" and "Output" (and collectively, "Your Content," "Customer Content," or "Your Local Content," as applicable) as defined in the Governing Terms. References to "Services" in this AUP apply to all products and applications governed by the applicable Governing Terms, regardless of the specific terminology used therein to describe such products or applications.
1. Purpose and Scope
1.1 Objective
The Services use generative AI to assist with coding, content creation, unit test generation, and related tasks. This AUP establishes guidelines to promote legal, ethical, secure, and responsible use of the Services, including responsible consumption of Services resources, and any code or content prompted to the Services ("Service Input") or generated through the Services ("Service Output").
1.2 Supplement to License Restrictions
Nothing in this AUP shall be construed to limit or negate any License Restrictions or other obligations set forth in the Governing Terms. Instead, this AUP imposes additional requirements on Users' behavior and the manner in which the Services, Service Input, and Service Output may be used.
2. Prohibited Content & Activities
2.1 Unlawful or Harmful Code or Content
- The Services must not be used to generate, support, or facilitate code or text that is unlawful, obscene, violent, hateful, harassing, sexually exploitative, or in violation of others' privacy rights—or that incites the same.
- Users shall refrain from engaging in any activity that violates applicable laws or regulations, including but not limited to those related to data protection, intellectual property, or export controls.
- Any use of the Services to encourage, enable, or assist in criminal or unlawful conduct is strictly prohibited, even if the generated code itself is not explicitly illegal to possess.
- The Services must not be used to generate content that is intentionally deceptive or misleading, including code designed to impersonate another person, entity, or system, or to fabricate credentials, certifications, or provenance of software artifacts.
- Users shall not submit personal data, regulated sensitive data, private keys, access tokens, passwords, secrets, or other credentials into the Services unless expressly permitted by the applicable Governing Terms or authorized product settings.
2.2 Malicious or Unauthorized Code and Exploits
- Generating, distributing, or embedding malware, viruses, trojans, worms, keyloggers, ransomware, or any other code designed to disrupt, damage, destroy, or gain unauthorized access to systems or data is prohibited.
- Developing automated exploits, backdoors, rootkits, or other tools primarily intended for malicious use is prohibited.
- Using the Services to identify or exploit software vulnerabilities without authorization is prohibited.
- Legitimate security testing (such as penetration testing or vulnerability scanning) may only be conducted with explicit authorization from the relevant system owners and in compliance with all applicable laws and regulations.
- The Services must not be used to produce code or instructions aimed at unlawful network intrusion, privilege escalation, or bypassing security measures without authorization from the owner of the targeted system.
- Any activity designed to disrupt or compromise the integrity, confidentiality, or availability of data, systems, or networks—unless expressly authorized by the relevant system owner—is prohibited.
2.3 Third-Party Intellectual Property
Users shall not prompt or otherwise utilize the Services to reproduce or misappropriate copyrighted code, patented processes, or other proprietary works without proper authorization. If the Service Output contains references to or snippets of third-party IP, additional human review and permission may be necessary prior to use, disclosure, distribution, or incorporation into any product or repository.
2.4 Usage Limits and Fair Use
- The Services are subject to usage limits, rate limits, credit or token caps, seat limits, feature limits, model limits, and other consumption thresholds shown in the Services or applicable Governing Terms ("Usage Limits"). Users must use the Services in a fair and reasonable manner consistent with their Account type, plan, Usage Limits, and the Services' intended purposes, including software development, workflow automation, and related productivity tasks.
- Users shall not, directly or indirectly:
(i) use automated tools, scripts, bots, or programmatic methods to circumvent, reset, or artificially extend Usage Limits or rate limits imposed by the Services;
(ii) create, maintain, or use multiple Accounts to multiply, pool, or otherwise exceed per-account or per-seat Usage Limits;
(iii) share, transfer, or pool account credentials or API keys in a manner that exceeds the per-seat or per-account limits of the applicable plan;
(iv) engage in usage patterns that are materially and consistently disproportionate to typical use for the applicable Account type or plan tier, including patterns that degrade the Services' performance or availability for other Users; or
(v) exploit model selection, multiplier structures, or promotional offerings in a manner designed to obtain Services capacity beyond what is intended for the applicable Account type or plan tier. - Zencoder may monitor usage patterns to maintain Services quality, availability, and security. Zencoder may take reasonable steps to enforce Usage Limits and prevent abusive or unfair use, including but not limited to warnings, throttling, rate limits, feature restrictions, or suspension as described in this AUP and the Governing Terms.
2.5 Services Integrity
In addition to the restrictions on interference with the Services set forth in the Governing Terms, Users shall not use the Services in any manner that degrades, disrupts, or unreasonably burdens the Services infrastructure, or that interferes with other Users' ability to access or use the Services. This includes, without limitation, deliberately initiating excessive concurrent sessions, flooding the Services with requests, or engaging in any activity that We reasonably determine constitutes denial-of-service behavior. Users who engage in conduct that results in material degradation of Services performance or availability may be held responsible for costs associated with remediation and restoration of Services operations.
2.6 Security and Technical Controls
- Users shall not attempt to bypass, disable, circumvent, or interfere with any security features, technical controls, content filters, safety mechanisms, rate limiters, authentication protocols, or access restrictions implemented within the Services.
- The following activities are also prohibited:
(i) accessing the Services through unauthorized APIs, bots, scrapers, extraction tools, or non-organic interfaces unless expressly authorized in writing by Us;
(ii) probing, scanning, or testing the Services for security or authentication vulnerabilities without Our prior written authorization;
(iii) using the Services as a proxy, pass-through, or intermediary to access underlying third-party models or services in a manner that circumvents the intended use of the Services for software development activities;
(iv) deliberately crafting Service Input designed to maximize token consumption, trigger unnecessary model calls, or otherwise inflate resource usage without a legitimate development purpose; and
(v) crafting Service Input designed to override, extract, or manipulate system prompts, safety instructions, content moderation controls, or model behavior, including through prompt injection, jailbreaking, or data poisoning.
2.7 Competitive Misuse and Model Extraction
Users shall not use the Services or any Service Output to: (a) scrape, distill, or systematically extract model behavior, weights, or outputs for the purpose of training, fine-tuning, or improving a competing AI model or product; (b) build or assist in building a product or service that competes with the Services; or (c) conduct benchmarking or performance comparisons of the Services for publication or commercial use without Our prior written authorization.
3. Best Practices and Responsible Use
3.1 Human Review
All Service Output is intended as assistance or guidance and may contain inaccuracies, incomplete logic, or references to third-party materials. Users are required to review, test, and validate any Service Output before use, deployment, disclosure, or distribution, especially in production environments. Users should assess Service Output for accuracy, security, legality, and any applicable license or IP obligations. Users remain solely responsible for all Service Output they use, deploy, or distribute.
3.2 Code Quality and Security
Prior to integration into production environments, Users should ensure that all generated code meets its own or organization's necessary security, reliability, and compliance requirements. This may include running security scans, checking for license compliance, reviewing performance, and conducting functional tests.
3.3 IP Verification
When Service Output includes suspected third-party code, designs, or other proprietary information, Users should verify permissions and obtain any necessary licenses before incorporating such output into products or solutions. Generated code may carry open-source license obligations, and Users remain responsible for compliance.
3.4 Ethical and Professional Standards
Users are encouraged to apply industry-accepted standards for coding, documentation, and project governance. Any usage of the Services that may adversely affect safety, human rights, or ethical norms is strongly discouraged and may be deemed a violation of this AUP.
3.5 Third-Party Policies
The Services may include access to large language models and other services provided by third parties. Users may not use the Services in a manner that violates the usage policies of such providers, including but not limited to: (a) Anthropic Usage Policy; (b) Anthropic Supported Regions Policy; (c) OpenAI Usage Policy; and (d) the usage policies of any other third-party model or service provider accessible through the Services, as identified within the Services interface or documentation. We may update the list of applicable third-party policies from time to time. If Users connect their own third-party accounts, API keys, tokens, CLIs, or repositories to the Services, Users are responsible for securing those credentials and complying with the applicable third-party terms.
3.6 Usage Monitoring
Users are encouraged to monitor their own consumption using the usage tracking tools available within the Services. Users who anticipate exceeding their Account type or plan's Usage Limits should consider upgrading to a higher-tier Account type or contacting Us to discuss their usage needs.
4. Updates to the AUP
We may update this AUP from time to time by posting a revised version at https://zencoder.ai/legal/acceptable-use-policy. Changes apply as described in the Governing Terms or as required by law.
5. Enforcement
Violations of this AUP may result in one or more of the following actions, at Our sole discretion: (a) warnings or notices to the User; (b) throttling, rate-limiting, or feature restrictions; (c) temporary suspension of all or part of the Services; or (d) termination of the User's Account and access to the Services. These remedies are in addition to any other remedies available under the Governing Terms or at law or equity, and We are not required to follow any particular sequence before exercising any available remedy. We reserve the right, but are not obligated, to monitor usage patterns and investigate potential misuse. We may report activity that appears to violate applicable law or regulation to appropriate authorities. In cases of willful or deliberate circumvention of security controls, Usage Limits, or other technical measures, We reserve the right to recover from the User incremental costs incurred as a direct result of such conduct, including excess third-party model provider fees, infrastructure costs, and investigation expenses.
6. Contact and Reporting
To report suspected violations of this AUP or to seek clarification, please contact Us at support@zencoder.ai. We will review and investigate all reported violations and take actions it deems appropriate under this AUP and the Governing Terms.