Acceptable Use Policy
Effective Date: May 2026 | Last Updated: May 2026
1. Scope
This Acceptable Use Policy (“AUP”) applies to all hosted services provided by Marketing Enigma AI, including but not limited to: MCP (Model Context Protocol) servers, API integrations, AI agent infrastructure, programmatic SEO systems, and any other hosted software or infrastructure we provide to you (“Hosted Services”).
By using our Hosted Services, you agree to comply with this AUP. Violation may result in immediate suspension or termination of your access without refund.
2. Permitted Use
You may use the Hosted Services only for lawful business purposes as intended by the applicable Statement of Work. Specifically, permitted uses include:
- Running MCP servers that connect your authorized business tools and APIs
- Processing data you own or have proper authorization to use
- Integrating with third-party services where you hold valid credentials and licenses
- Automating business workflows within your organization
- Serving programmatic SEO pages for your own domains
3. Prohibited Activities
You may NOT use our Hosted Services to:
3.1 Illegal or Harmful Activities
- Violate any applicable local, state, national, or international law or regulation
- Facilitate fraud, phishing, identity theft, or financial crimes
- Distribute malware, viruses, or other malicious code
- Engage in activities that exploit, harm, or threaten minors
- Process or store illegal content of any kind
3.2 Spam and Abuse
- Send unsolicited bulk email, messages, or communications (spam)
- Harvest email addresses or personal information without consent
- Create fake accounts, reviews, or engagement on third-party platforms
- Engage in click fraud or artificial traffic generation
- Use MCP servers to automate actions that violate third-party terms of service
3.3 Unauthorized Access
- Attempt to access systems, accounts, or data without authorization
- Scrape, crawl, or mine data from services without proper authorization
- Circumvent rate limits, access controls, or security measures
- Use credentials belonging to other users or organizations
- Probe, scan, or test the vulnerability of our systems without written permission
3.4 Resource Abuse
- Exceed allocated resource limits (compute, storage, bandwidth, API calls) without upgrading your plan
- Use Hosted Services for cryptocurrency mining
- Run processes that degrade service for other clients
- Use Hosted Services as general-purpose compute unrelated to contracted services
- Resell, sublicense, or redistribute access to Hosted Services without written consent
3.5 Content Restrictions
- Host or distribute content that infringes intellectual property rights
- Store or process regulated data (HIPAA, PCI-DSS, etc.) unless specifically agreed in your SOW with appropriate compliance measures
- Generate or distribute deepfakes, synthetic media designed to deceive, or disinformation
- Use AI capabilities to impersonate real individuals without consent
4. Security Responsibilities
You are responsible for:
- Keeping your API keys, access tokens, and credentials secure
- Promptly reporting any suspected security breach or unauthorized access
- Maintaining appropriate access controls within your organization
- Ensuring any data you provide to our systems is obtained lawfully
- Notifying us immediately if your credentials are compromised
5. Resource Limits
Each Hosted Services plan includes specified resource allocations. Default limits (unless otherwise stated in your SOW) include:
- API Calls: As specified in your plan tier
- Storage: As specified in your plan tier
- Bandwidth: Reasonable use consistent with the service purpose
- Concurrent Connections: As specified in your plan tier
If you anticipate exceeding these limits, contact us to discuss plan upgrades before exceeding your allocation.
6. Monitoring and Enforcement
6.1 Monitoring. We reserve the right to monitor usage patterns for security, compliance, and resource management purposes. We do not monitor the content of your data except as necessary to investigate reported violations.
6.2 Enforcement Actions. Upon discovering or receiving a report of a violation, we may at our sole discretion:
- Issue a warning and request correction within a specified timeframe
- Temporarily suspend access to investigate
- Permanently terminate access without refund for severe violations
- Report illegal activities to appropriate authorities
- Pursue legal remedies for damages caused
6.3 Notice. Except in cases of imminent harm or illegal activity, we will provide reasonable notice before taking enforcement action and give you an opportunity to address the violation.
7. Reporting Violations
If you become aware of any violation of this AUP, please report it to hello@marketingenigma.ai with subject line “AUP Violation Report.”
8. Changes to This Policy
We may update this AUP as our services evolve. We will notify active clients of material changes via email at least 15 days before they take effect. Continued use of Hosted Services after changes take effect constitutes acceptance.
9. Related Policies
Questions about acceptable use?
Contact us for clarification before proceeding.