Legal
Usage Policy
Effective date: April 29, 2026
This Usage Policy, also called our Acceptable Use Policy, applies to anyone who accesses, uses, submits inputs to, receives outputs from, integrates with, or provides access to Recursite. It is intended to promote safe, lawful, and responsible use as Recursite evolves.
We may use automated systems, safeguards, monitoring, and human review to enforce this policy. If we believe this policy has been violated, we may block or modify outputs, limit features, throttle usage, suspend accounts, terminate access, remove content, or take other action described in our Terms.
Quick navigation
Universal Usage Standards
These standards apply to all users, accounts, integrations, outputs, workflows, and use cases involving Recursite.
Do Not Violate Applicable Laws or Engage in Illegal Activity
You may not use Recursite to violate laws, regulations, or legal rights.
- Acquire, exchange, distribute, or facilitate illegal or controlled substances, contraband, or illicit services.
- Engage in or facilitate human trafficking, exploitation, prostitution, coercion, or other unlawful activity.
- Infringe, misappropriate, or violate intellectual property, privacy, publicity, contractual, or other legal rights.
- Evade sanctions, export controls, supported-region limits, court orders, or other legal restrictions.
Do Not Compromise Critical Infrastructure
You may not use Recursite to threaten systems essential to public safety or welfare.
- Disrupt or facilitate disruption of power grids, water treatment, hospitals, medical devices, telecommunications, transportation, air traffic control, voting systems, emergency services, or similar infrastructure.
- Gain or facilitate unauthorized access to critical systems, including healthcare databases, financial market infrastructure, public-sector systems, or military facilities.
- Develop plans, instructions, code, or automation designed to degrade, sabotage, or interfere with critical infrastructure.
Do Not Compromise Computer or Network Systems
You may not use Recursite for unauthorized cyber abuse or harmful security activity.
- Discover, exploit, weaponize, or scale vulnerabilities without authorization from the system owner.
- Gain unauthorized access through technical attacks, credential theft, phishing, social engineering, or bypassing access controls.
- Create, modify, deploy, or distribute malware, ransomware, spyware, credential stealers, botnets, destructive payloads, or exploit kits.
- Develop tools for denial-of-service attacks, mass scanning for abuse, persistence, evasion, command-and-control, unauthorized monitoring, or interception.
- Bypass endpoint protection, authentication, logging, monitoring, rate limits, or other security controls.
Do Not Develop or Design Weapons
You may not use Recursite to create or facilitate systems intended to cause physical harm.
- Produce, modify, design, acquire, or deploy weapons, explosives, dangerous materials, or systems intended to harm people.
- Design weaponization, targeting, delivery, concealment, or evasion processes for weapons or dangerous materials.
- Synthesize, optimize, or acquire biological, chemical, radiological, nuclear, or high-yield explosive weapons or precursors.
- Circumvent safety, regulatory, detection, or medical countermeasure controls related to weapons or dangerous materials.
Do Not Incite Violence or Hateful Behavior
You may not use Recursite to promote violence, terrorism, extremism, or hatred.
- Incite, facilitate, praise, recruit for, or provide material support to terrorism, violent extremism, or targeted violence.
- Threaten, intimidate, or encourage violence against people, groups, animals, property, or institutions.
- Promote hateful, discriminatory, or dehumanizing conduct based on protected or sensitive attributes.
- Create instructions, propaganda, operational plans, or persuasive materials designed to facilitate violence or hateful behavior.
Do Not Compromise Privacy, Identity, or Confidentiality Rights
You may not use Recursite to violate privacy, impersonate people, or misuse sensitive data.
- Collect, solicit, infer, disclose, or misuse personal data without lawful basis or permission.
- Access, expose, or process confidential, proprietary, health, biometric, neural, financial, or non-public contact information without authorization.
- Impersonate a person, organization, or human operator in a way that deceives others or hides that they are interacting with AI.
- Create fake identities, synthetic personas, forged communications, or misleading representations without a lawful and non-deceptive purpose.
Do Not Compromise Children's Safety
A child or minor means anyone under 18 years old, regardless of jurisdiction.
- Create, solicit, distribute, transform, or promote child sexual abuse material, including AI-generated or fictionalized CSAM.
- Facilitate trafficking, sextortion, grooming, coercion, exploitation, or abuse of a minor.
- Generate sexualized content involving minors or content designed to impersonate minors for sexual, exploitative, or grooming purposes.
- Provide instructions for concealing, enabling, or normalizing child abuse or exploitation.
- If we detect apparent CSAM or coercion or enticement of a minor, we may report it to relevant authorities.
Do Not Create Psychologically or Emotionally Harmful Content
You may not use Recursite to intensify self-harm, harassment, abuse, or gratuitous cruelty.
- Facilitate, promote, instruct, or glamorize suicide, self-harm, disordered eating, or unhealthy compulsive exercise.
- Shame, humiliate, bully, harass, stalk, intimidate, or coordinate abuse against an individual or group.
- Generate content celebrating suffering, animal cruelty, graphic violence, gratuitous gore, or sexual violence.
- Deploy manipulative, deceptive, or coercive techniques intended to cause emotional harm or impair decision-making.
Do Not Create or Spread Deceptive Misinformation
You may not use Recursite to mislead people about facts, institutions, identity, or origin.
- Create or disseminate deceptive or misleading information targeting a person, group, organization, market, or public institution.
- Misrepresent laws, regulations, procedures, public benefits, medical or scientific facts, safety information, or institutional standards.
- Generate conspiratorial narratives designed to target, harass, defame, or mislead people or groups.
- Create fake personas, synthetic media, fake reviews, fabricated evidence, or misattributed content intended to deceive.
Do Not Undermine Democratic or Civic Processes
You may not use Recursite to deceive, suppress, or manipulate civic participation.
- Engage in personalized vote or campaign targeting using individual profiles, sensitive data, or deceptive tactics.
- Create artificial political movements, astroturfing, or synthetic civic activity that misrepresents source, scale, sponsorship, or nature.
- Generate deceptive political content, synthetic media of public figures, or false claims about candidates, policies, voting procedures, election security, or civic processes.
- Automate mass communications to voters, public officials, or civic participants while concealing artificial origin.
- Suppress turnout, intimidate voters, or incite disruption of voting, vote counting, certification, or lawful civic participation.
Do Not Use for Prohibited Surveillance or Law Enforcement Purposes
You may not use Recursite in ways that impair liberty, civil liberties, or human rights.
- Make criminal justice determinations, including parole, sentencing, custody, bail, or law enforcement eligibility decisions.
- Track a person's location, emotional state, communications, relationships, or behavior without consent or lawful authority.
- Build or support predictive policing, battlefield management, social scoring, rights-impairing surveillance, or unauthorized facial recognition.
- Analyze or identify content for government censorship or biometric categorization based on sensitive attributes.
- Use Recursite in law enforcement applications that violate or impair rights, due process, privacy, or civil liberties.
Do Not Engage in Fraudulent, Abusive, or Predatory Practices
You may not use Recursite to exploit, deceive, defraud, or manipulate people.
- Facilitate scams, phishing, credential theft, fraud, counterfeit goods, falsified documents, fake IDs, fake currency, or deceptive products.
- Generate spam, fake reviews, fake engagement, deceptive ads, or misleading media intended to manipulate people or platforms.
- Promote predatory lending, abusive debt collection, pyramid schemes, multi-level marketing abuse, or exploitative high-pressure sales tactics.
- Exploit people based on age, disability, health, economic hardship, crisis, or other vulnerability.
- Plagiarize, submit AI-assisted work without required permission or attribution, or bypass another platform's rules or safeguards.
Do Not Abuse Recursite
You may not abuse Recursite accounts, safeguards, access, or infrastructure.
- Coordinate harmful activity across accounts, create accounts through automation, evade bans, or provide access to suspended users.
- Circumvent product limits, safety controls, security controls, moderation, pricing, usage limits, or account restrictions.
- Use prompt injection, jailbreaks, or other bypass techniques to produce harmful outputs or violate this policy without prior authorization.
- Use Inputs, Outputs, automated scraping, or model interactions to train, distill, evaluate, or replicate a competing AI model or service without authorization.
- Interfere with service operation, degrade availability, overload systems, or disrupt other users' experience.
Do Not Generate Sexually Explicit Content
You may not use Recursite to produce or facilitate explicit sexual content.
- Depict or request sexual intercourse, sex acts, erotic roleplay, or explicit sexual chats.
- Generate content related to sexual fetishes or fantasies.
- Facilitate, promote, or depict incest, bestiality, sexual coercion, non-consensual sexual content, or sexual exploitation.
- Sexual content involving minors is strictly prohibited and addressed under Children's Safety above.
High-Risk Use Case Requirements
Some use cases pose elevated risk because they can affect rights, access to essential services, safety, welfare, financial outcomes, or public trust. These use cases require additional safeguards.
Required safeguards
- Human-in-the-loop: a qualified human professional must review advice, recommendations, or subjective decisions before they are delivered to or finalized for individuals or consumers.
- Disclosure: if Recursite or AI-generated output is presented directly to individuals or consumers, you must clearly disclose that AI was used to help produce the advice, decision, recommendation, or content.
- Accuracy and appropriateness: you or your organization remain responsible for the accuracy, legality, fairness, explainability, and appropriateness of the final use.
- Appeal or review: where decisions materially affect rights, eligibility, access, safety, or welfare, you must provide meaningful human review or appeal where required by law or appropriate to the risk.
High-risk categories
- Legal: legal interpretation, legal guidance, legal drafting presented as advice, or decisions with legal implications.
- Healthcare: medical diagnosis, treatment, patient care, therapy, mental health, or other medical guidance. General wellness content may be lower risk but still requires care.
- Insurance: underwriting, claims processing, pricing, eligibility, or coverage decisions involving health, life, property, disability, or other insurance.
- Finance: investment advice, loan approvals, creditworthiness, eligibility, benefits, debt, trading, or other financial decisions.
- Employment and housing: hiring, resume screening, work allocation, termination, promotion, leasing, housing eligibility, or mortgage eligibility.
- Academic testing, accreditation, and admissions: scoring, ranking, admissions decisions, certification, language proficiency, standardized testing, or institutional accreditation.
- Media or professional journalistic content: automated generation or publication of externally distributed news, investigations, or professional media content.
Additional Use Case Guidelines
The following guidelines apply in addition to the universal standards and high-risk requirements above.
Consumer-Facing Chatbots and AI Agents
Interactive experiences that face consumers require clear transparency and responsible operation.
- Disclose that users are interacting with AI rather than a human at the beginning of each chat or session.
- Do not falsely claim professional, human, governmental, medical, legal, financial, or emergency-service status.
- Provide escalation paths to qualified humans where the use case, risk, or applicable law requires it.
Products Serving Minors
Products intended for or likely to be used by minors must use stronger protective controls.
- Comply with child safety, privacy, age-appropriate design, parental consent, and education-sector requirements that apply to your product.
- Avoid manipulative, addictive, sexual, exploitative, bullying, self-harm, or age-inappropriate experiences.
- Use safeguards appropriate to the age of users, including content filtering, reporting, escalation, and monitoring where lawful and appropriate.
Agentic Workflows
Agentic features must not be used to bypass safeguards or shift responsibility away from the user.
- You are responsible for actions that Recursite agents, automations, tools, scripts, or integrations take at your direction.
- Use appropriate permissions, sandboxing, rate limits, review gates, logging, rollback plans, and human approval for consequential actions.
- Do not authorize agents to access systems, data, accounts, or tools unless you have permission and the action complies with this policy.
- Do not use agents to conduct prohibited cyber, fraud, spam, harassment, surveillance, or platform-abuse activity at scale.
Integrations, Connectors, and MCP Servers
Integrations must respect user control, data boundaries, and applicable third-party rules.
- Only connect services, accounts, repositories, files, tools, or MCP servers you are authorized to use.
- Do not use integrations to exfiltrate data, bypass access controls, impersonate users, or violate third-party terms.
- Connector, plugin, and MCP-style integrations should provide accurate descriptions, limited permissions, secure handling of secrets, and clear user consent.
Enforcement and Reporting
- We may update this Usage Policy as our technology, products, risks, laws, and safeguards evolve.
- We may investigate suspected violations using product signals, user reports, automated safeguards, third-party notices, and human review.
- Violations may result in output blocking, content removal, warning, rate limiting, feature restriction, account suspension, termination, or reporting to authorities where appropriate or required.
- To report harmful, unsafe, inaccurate, biased, or policy-violating behavior, contact usersafety@interneuronlabs.com.