This Acceptable Use Policy ("AUP") sets forth the requirements and restrictions governing access to and use of products and services provided by For Good AI Inc. dba Zencoder Inc. ("Company"), including the Zencoder hosted platform and the Zenflow Desktop Application (collectively, the "Services"). The Services may be governed by terms provided: (i) directly under Company's Zencoder Terms of Service; (ii) under Company's Zenflow Terms of Service; (iii) pursuant to a separate enterprise master agreement or similar contract executed between Company and a Customer entity ("Enterprise Agreement"); or (iv) in accordance with terms made available to the Customer via an authorized reseller, channel partner, or other third party (each an "Authorized Provider"). All such applicable terms and conditions (collectively, the "Governing Terms") are incorporated by reference into this AUP. In the event of any conflict between this AUP and the Governing Terms, the more restrictive provision shall control. By accessing or using the Services, all end users (collectively, "Users") are deemed to have accepted and agree to comply with this AUP. For clarity, "Service Input" and "Service Output" as used in this AUP correspond to "Input" and "Output" (and collectively, "Your Content," "Customer Content," or "Your Local Content," as applicable) as defined in the Governing Terms. References to "Services" in this AUP apply to all products and applications governed by the applicable Governing Terms, regardless of the specific terminology used therein to describe such products or applications.
1. Purpose and Scope
1.1 Objective
The Services use generative AI to assist with coding, content creation, unit test generation, and related tasks. This AUP establishes guidelines to promote legal, ethical, secure, and responsible use of the Services, including responsible consumption of Services resources, and any code or content prompted to the Services ("Service Input") or generated through the Services ("Service Output").
1.2 Supplement to License Restrictions
Nothing in this AUP shall be construed to limit or negate any License Restrictions or other obligations set forth in the Governing Terms. Instead, this AUP imposes additional requirements on Users' behavior and the manner in which the Services, Service Input, and Service Output may be used.
2. Prohibited Content & Activities
2.1 Unlawful or Harmful Code or Content
- The Services must not be used to generate, support, or facilitate code or text that is unlawful, obscene, violent, hateful, harassing, sexually exploitative, or in violation of other's privacy rights—or that incites the same.
- Users shall refrain from engaging in any activity that violates applicable laws or regulations, including but not limited to those related to data protection, intellectual property, or export controls.
- Any use of the Services to encourage, enable, or assist in criminal or unlawful conduct is strictly prohibited, even if the generated code itself is not explicitly illegal to possess.
- The Services must not be used to generate content that is intentionally deceptive or misleading, including code designed to impersonate another person, entity, or system, or to fabricate credentials, certifications, or provenance of software artifacts.
2.2 Malicious or Unauthorized Code and Exploits
- Generating, distributing, or embedding code that is designed to disrupt, damage, or gain unauthorized access to systems (e.g., viruses, trojans, worms, keyloggers) is prohibited.
- Any attempt to develop automated exploits, backdoors, or other tools primarily intended for malicious use is disallowed.
- Using the Services to identify or exploit software vulnerabilities in an unethical or unauthorized manner is disallowed.
- Legitimate security testing (such as penetration testing or vulnerability scanning) may only be conducted with explicit authorization from the relevant system owners and in compliance with all applicable laws and regulations.
- The Services must not be used to produce code or instructions aimed at unlawful network intrusion, privilege escalation, or bypassing security measures without permission from the owner of the targeted system.
- Any activity designed to disrupt or compromise the integrity or availability of data, systems, or networks—unless expressly authorized—is prohibited.
2.3 Third-Party Intellectual Property
Users shall not prompt or otherwise utilize the Services to reproduce or misappropriate copyrighted code, patented processes, or other proprietary works without proper authorization. If the Service Output contains references to or snippets of third-party IP, additional human review and permission may be necessary prior to use or distribution.
2.4 Usage Limits and Fair Use
- The Services are subject to usage limits, including daily call limits, monthly token usage caps, and other consumption thresholds applicable to each User's Account type or plan tier (collectively, "Fair Use Limits"). Fair Use Limits are described within the Services interface and may be updated by Company from time to time.
- Without limiting the License Restrictions in the Governing Terms, and in furtherance of the Fair Use Limits described above, Users shall not, directly or indirectly:
(i) use automated tools, scripts, bots, or programmatic methods to circumvent, reset or artificially extend Fair Use Limits or rate limits imposed by the Services;
(ii) create, maintain, or use multiple accounts (whether free, trial, or paid) to multiply, pool, or otherwise exceed per-account or per-seat usage allowances;
(iii) share, transfer, or pool account credentials or API keys among individuals or entities in a manner that exceeds the per-seat or per-account limits of the applicable plan;
(iv) engage in usage patterns that are materially and consistently disproportionate to typical use for the applicable Account type or plan tier, including patterns that degrade the Services performance or availability for other Users; or
(v) exploit model selection, multiplier structures, or promotional offerings in a manner designed to obtain Services capacity beyond what is intended for the applicable Account type or plan tier. - Company monitors aggregate usage patterns to maintain Services quality and availability for all Users. Company is not obligated to provide advance notice before taking action under this Section 2.4, but will endeavor to notify affected Users where practicable.
2.5 Services Integrity
In addition to the restrictions on interference with the Services set forth in the Governing Terms, Users shall not use the Services in any manner that degrades, disrupts, or unreasonably burdens the Services infrastructure, or that interferes with other Users' ability to access or use the Services. This includes, without limitation, deliberately initiating excessive concurrent sessions, flooding the Services with requests, or engaging in any activity that Company reasonably determines constitutes denial-of-service behavior. Users who engage in conduct that results in material degradation of Services performance or availability may be held responsible for costs associated with remediation and restoration of Services operations.
2.6 Security and Technical Controls
- In addition to the security-related restrictions in the Governing Terms, Users shall not attempt to bypass, disable, circumvent, or interfere with any security features, technical controls, content filters, safety mechanisms, rate limiters, authentication protocols, or access restrictions implemented within the Services.
- Without limiting the generality of Section 2.6(a), the following activities are prohibited:
(i) crafting Service Input designed to override, extract, or manipulate system prompts, safety instructions, or content moderation controls (commonly referred to as "prompt injection" or "jailbreaking");
(ii) probing, scanning, or testing the Services for vulnerabilities in its security or authentication mechanisms without Company's prior written authorization;
(iii) using the Services as a proxy, pass-through, or intermediary to access underlying third-party models or services, whether for the User's own benefit or for the benefit of any third party, in a manner that circumvents the intended use of the Services for software development activities; and
(iv) deliberately crafting Service Input designed to maximize token consumption, trigger unnecessary model calls, or otherwise inflate resource usage without a legitimate development purpose.
3. Best Practices and Usage Hygiene
3.1 Human Review
All Service Output is intended as assistance or guidance and may contain inaccuracies, incomplete logic, or references to unauthorized third-party materials. Users are required to review, test, and validate any Service Output before deploying it in any production environment or distributing it to third parties. Users remain solely responsible for all Service Output they use, deploy, or distribute, regardless of whether human review was conducted.
3.2 Code Quality and Security
Prior to integration into production environments, Users should ensure that all generated code meets its own or organization's necessary security, reliability, and compliance requirements. This may include running security scans, checking for license compliance, reviewing performance, and conducting functional tests.
3.3 IP Verification
When Service Output includes suspected third-party code, designs, or other proprietary information, Users should verify permissions and obtain any necessary licenses before incorporating such Service Output into products or solutions.
3.4 Ethical and Professional Standards
Users are encouraged to apply industry-accepted standards for coding, documentation, and project governance. Any usage of the Services that may adversely affect safety, human rights, or ethical norms is strongly discouraged and may be deemed a violation of this AUP.
3.5 Third-Party Policies
The Services may include access to large language models and other services provided by third parties. Users may not use the Services in a manner that violates the usage policies of such third-party providers, including but not limited to: (a) Anthropic Usage Policy; (b) Anthropic Supported Regions Policy; and/or (c) OpenAI Usage Policy; and/or (d) the usage policies of any other third-party model or service provider accessible through the Services, as identified within the Services interface or documentation. Company may update the list of applicable third-party policies from time to time without amending this AUP.
3.6 Usage Monitoring
Users are encouraged to monitor their own consumption using the usage tracking tools available within the Services. Users who anticipate exceeding their Account type or plan's Fair Use Limits should consider upgrading to a higher-tier Account type or contacting Company to discuss their usage needs.
4. Updates to the AUP
Company reserves the right to modify or update this AUP at any time and will notify Users by posting a revised version on https://zencoder.ai/legal/acceptable-use-policy. Continued use of the Services following any update constitutes acceptance of the revised AUP. Where required by law, material changes shall be communicated in accordance with the Governing Terms or other applicable terms.
5. Enforcement
Violations of this AUP may result in one or more of the following actions, at Company's sole discretion: (a) warnings or notices to the User; (b) throttling or rate-limiting of Services access; (c) temporary suspension of all or part of the Services; or (d) termination of the User's Account and access to the Services. The foregoing remedies are in addition to any other remedies available under the Governing Terms or in law or equity, and Company is not required to follow any particular sequence of actions before exercising any available remedy. Company reserves the right, but is not obligated, to monitor usage patterns, content, and to investigate any potential misuse. Company may report any activity that appears to violate law or regulation to appropriate authorities without further notice to the User. In cases of willful or deliberate circumvention of security controls, Fair Use Limits, or other technical measures, Company reserves the right to recover from the User any incremental costs incurred by Company as a direct result of such conduct, including but not limited to excess third-party model provider fees, infrastructure costs, and investigation expenses.
6. Contact and Reporting
To report suspected violations of this AUP or to seek clarification regarding its terms, please contact Company at support@zencoder.ai. Company will review and investigate all reported violations, taking any actions deemed appropriate under this AUP and the Governing Terms.