Acceptable Use Policy

Updated on: 8th August 2025

This Acceptable Use Policy sets out acceptable and unacceptable conduct for your use of the Services and Avatars.
You agree to do what is listed under General Requirements and to abstain from those activities listed under Categories of Prohibitions.
You also will not authorize, enable, induce, or encourage any third party to carry out those prohibited activities.
If we believe a violation of the policy is deliberate, repeated, or presents a credible risk of harm to other users, customers, the Services, or any third parties, we may suspend or terminate your access.
This policy may change as the Services and industry evolve, so please check back regularly for updates and changes. Capitalized terms used below but not defined in this policy have the meaning set forth in the governing agreement.

GENERAL REQUIREMENTS
a) Comply with applicable laws and governmental regulations, including all intellectual property, data protection, privacy, artificial intelligence, and export control laws.
b) Use the Services for your organization’s or company’s business needs, rather than for consumer, personal, or household purposes.
c) Use commercially reasonable efforts to prevent unauthorized access and use of the Services.
d) Monitor and control all activity conducted through your account in connection with the Services.
e) Clearly inform end users that they are interacting with an AI generated avatar, and keep any provenance or watermarking signals intact.
f) Moderate the use of Avatars to ensure that the rights and interests of individuals are respected and the public is protected from harm.

CATEGORIES OF PROHIBITIONS
1. Impersonation, Deception & Abuse of Individual Rights
a) Uploading, generating, or using a person’s face, image, name, voice, or video without documented consent, and for minors without verifiable parental consent.
b) Violating, misappropriating, or infringing a person’s right to privacy or publicity, including any of their moral or intellectual property rights.
c) Using the Services, or transmitting through the Services, any data or information for the purposes of committing fraud, elder abuse, or identity theft, or for the purposes of furthering any of the foregoing.
d) Using the Services to send altered, deceptive, or false source-identifying information, including "spoofing" or "phishing".
e) Using the Services in a way that is obscene, defamatory, insulting, hostile, inciting, threatening, or discriminatory towards an individual or a group of individuals.

2. Adult Content & Abuse of Minors
a) Using the Services in a manner that exploits, harms, or attempts to exploit or harm minors in any way, for example by representing or portraying them with Avatars, or exposing them to inappropriate content.
b) Using the Services for the purpose of promoting or providing adult entertainment.
c) Using the Services to promote or advertise age restricted goods, services, or venues, including alcohol, tobacco, vaping products, psychoactive substances, firearms, gambling, sex toys, escort services, and dating services.

3. Campaigns, Communications & Abuse of the Public Interest
a) Running unlawful misinformation or disinformation campaigns, or violating platform rules by presenting fabricated facts as authentic without required labels.
b) Removing, deactivating, or disabling any ‘watermarks’ or other mechanisms of the Services that are designed to help validate provenance or differentiate between human-generated and AI-generated content.
c) When redistributing outputs, you must preserve any watermarking or provenance signals unless a platform requires technical transformation and there is no feasible alternative.
d) Using the Services to send unsolicited communications, promotions, or advertisements, including spam and robocalls.
e) Incorporating a Stock Avatar in content for "promoted", "boosted", or "paid" advertising on any social media platform or similar media, absent written express consent from Beyond Presence.
f) Using the Services to provide material support or resources (or to conceal or disguise the nature, location, source, or ownership of material support or resources) to any organization(s) designated by either the United States as a foreign terrorist organization pursuant to section 219 of the Immigration and Nationality Act, or by the United Kingdom or European Union pursuant to similar laws and regulations concerning national security, defense, or terrorism.
g) Using the Services in a manner that could result in the death or serious bodily injury of any person or in other catastrophic damage, including through warfare or the operation of critical infrastructure.

4. Beyond Presence Technology & Abuse of Access
a) Scraping any content or data from Beyond Presence or the Services for the creation or training of AI models or tools, including machine learning models, generative models, deep learning models, and artificial neural networks.
b) Using the Services or any outputs, including Avatars, Interactions, frames, audio streams, or metadata, to create, train, fine tune, benchmark, or improve any models or datasets, except as expressly permitted in the Order Form.
c) Using the face, voice, or motion of any Avatar to build a look alike or sound alike model outside the Services.
d) Uploading to, or transmitting from, the Services any data, file, software, or link that contains or redirects to a virus, Trojan horse, worm, or other harmful component or a technology that unlawfully accesses or downloads content or information stored within the Services or on the hardware of Beyond Presence or any third party.
e) Attempting to reverse engineer, decompile, hack, disable, interfere with, disassemble, modify, copy, translate, or disrupt the features, functionality, integrity, or performance of the Services (including any mechanism used to restrict or control the functionality of the Services), any third party use of the Services, or any third party data contained therein (except to the extent such restrictions are prohibited by applicable law).
f) Attempting to gain unauthorized access to the Services or related systems or networks or to defeat, avoid, bypass, remove, deactivate, or otherwise circumvent any software protection or monitoring mechanisms of the Services.
g) Abusing referrals or promotions for the Services, for example to get more credits than deserved.

5. Beyond Presence Content & Abuse of Third Party Rights
a) Using a Stock Avatar in a manner that may attribute or impute any of your statements, opinions, or commentary to the actor, for example, any discussions about medical conditions or disabilities.
b) Using a Stock Avatar in a TV program, news broadcast, fundraise, or political campaign, or in the dissemination of any commentary around current events, politics, or topics that may be polarizing or sensitive to certain demographics, absent written consent from Beyond Presence.
c) Using a Stock Avatar to create, offer, or sell any non-fungible tokens (NFTs), or incorporating any Stock Avatar therein.
d) Incorporating any Stock Avatar in any patents, trademarks, design marks, or service marks, or any registrations or filings thereof.
e) Reselling, sublicensing, or distributing any Stock Avatar as a standalone asset or in template packs, including on marketplaces, outside the Services.
f) Altering or combining a Stock Avatar to resemble an identifiable real person, or using a Stock Avatar in a way that implies the human actor endorses Customer, a product, or a viewpoint.
g) Extracting or attempting to extract face, voice, motion, mesh, texture, or model data from any Stock Avatar, or using Stock Avatar outputs to create a derivative avatar outside the Services.