Helpshift Acceptable Use Policy

Last Updated:  19 August 2024

Table of Contents

This Acceptable Use Policy (“AUP”) forms part of, and is incorporated into, the Enterprise Terms or, where applicable, the bespoke agreement entered between Customer and Helpshift (the “Agreement”). Capitalized terms not defined herein have the meaning given to them in the Agreement

Scope

This AUP applies to all Customers, Authorized Users and Customer Personnel who use the Services provided by Helpshift, as well as any user of the Services, including those accessing through products and services provided by Customer. The prohibited conduct in this AUP is not exhaustive. Customer is responsible for ensuring compliance with this AUP by Authorized Users, Customer Personnel and any other users of the Services. This responsibility includes monitoring and removing, as necessary, content published through the Services in violation of this AUP.  

Updates

This AUP may be updated by Helpshift from time to time upon reasonable notice, which may be provided via Customer’s account, e-mail, or by posting an updated version of this AUP at https://www.helpshift.com/legal/aup

Conflict

In the event of a conflict with this AUP and any third-party terms or policies listed in the Product Specific Terms that apply to you when using a Product, this AUP will control to the extent of the conflict.

Remedies

A violation of this AUP constitutes a violation of the Agreement. If Helpshift determines, in its sole discretion, that Customer or any other users of the Services that has violated this AUP, Helpshift may, without affecting any other available remedies, temporarily or permanently suspend or terminate the Customer’s account or access to the Services. Such action may be taken without prior notice or liability to the Customer.

Prohibited Activities

General

  1. Illegal Content or Activities

    The Services may not be used for any illegal, prohibited or fraudulent purposes, or to promote such activities, or to publish illegal or fraudulent content. This includes violating any applicable laws, regulations, industry standards, or consent requirements in any jurisdiction, including without limitation data protection, privacy, artificial intelligence (AI) and export control laws.

  2. Security Vulnerabilities

    You may not probe, scan, or test the vulnerability of any system or network used with the Services. This includes attempts to find and exploit security vulnerabilities or bypass any security mechanisms or filtering capabilities of the Services.

  3. Unauthorized Access

    You may not tamper with, reverse engineer, hack, or attempt to gain unauthorized access to the Services or related systems, networks, or data. This prohibition includes circumventing security or authentication measures, copying, disassembling, or decompiling the Services. Attempts to gain unauthorized access through spoofing or social engineering are also forbidden.

  4. System Integrity

    You may not modify, disable, or use in any manner that interferes with, disrupts, or negatively impacts the integrity or performance of the Services, related systems, networks, or data. This prohibition extends to any third-party networks linked to the Services.

  5. Access Restrictions

    You may not access or search the Services by any means other than publicly supported interfaces.

  6. Scraping

    You may not copy, modify, create derivative works of, distribute, or disclose any part of the Services in any medium, including without limitation by any automated or non-automated “scraping”.

  7. Monitoring

    You may not access or use the Services in order to monitor its availability, performance, or functionality for competitive purposes.

  8. Abuse of Systems

    You may not overwhelm or attempt to overwhelm our infrastructure by imposing an unreasonably large load on the Services that consume extraordinary resources, such as by: (i) using “robots,” “spiders,” “offline readers” or other automated systems to send more request messages to our servers than a human could reasonably send in the same period of time using a normal browser; or (ii) going far beyond the use parameters for any given Service as described in its corresponding documentation.

  9. Spam or Unsolicited Communications

    The Services may not be used to send spam, including unwanted commercial content, mass solicitations, or unsolicited messages. This extends to generating unsolicited communications, advertising, or phishing attempts. You may not impair our ability to send communications, such as causing us to be placed on email blocklists or denied service.

  10. Deceptive Behavior and Identity Misrepresentation

    You may not use our Services to deceive others or misrepresent your identity. This prohibition includes impersonating third parties, falsely implying associations, disguising the origin of submitted information (such as “spoofing” or “phishing”), and accessing accounts without proper authorization. Any form of deception or unauthorized access is strictly forbidden.

  11. Intellectual Property

    You may not use our Services in any manner that infringes upon the intellectual property rights or other rights of Helpshift or any third party. This prohibition applies to both direct and indirect infringement.

  12. Unauthorized Disclosure of Information

    You may not submit, post, upload, or otherwise provide any data, content, or information that you don’t have the right to use, including unauthorized disclosure of confidential or personal information.

  13. Harmful Code and Malicious Activities

    The Services may not be used to transmit, send, or deploy any code, files, scripts, agents, or programs intended to cause harm. This prohibition includes, but is not limited to, viruses, malware, bots, worms, and scripting exploits. Additionally, the use of automated means, such as bots, to gain unauthorized access to or use the Services is forbidden. This policy extends to any automated content or traffic that could harm networks, services, or infrastructure of Helpshift or any third party.

  14. Hateful Activities

    You may not use our services to transmit or host hate speech, advocate violence or terrorism, distribute graphically violent or obscene content, or to support or normalize hateful, racist, libelous, or discriminatory activities.

  15. Child Exploitation and Human Trafficking

    Use of our Services for any content or activity that promotes or displays child sexual exploitation or abuse is prohibited. We will remove such content from the Service and take appropriate action. Further, uploading or sharing content that promotes, enables or discusses human trafficking is prohibited.

  16. Harassment and Bullying

    You may not use our Services to engage in abusive, harassing, or bullying behavior, harmful to minors, including when contacting Helpshift for customer support.

AI Products

In addition to the general restrictions outlined above for using the Services, this section applies when you are using any AI Product. You agree not to use and not to allow anyone else to use (including by prompting or generating any Output) any AI Products for the following purposes:

 

  1. To make or directly assist automated decisions that will affect an individual’s safety, rights, well-being, or that produce legal effects or similarly significant effects concerning an individual;
  2. To provide financial, legal, medical or other professional advice, or to practice any occupation that requires a license under applicable laws;
  3. In a way that counts as using a medical device or medical device software;
  4. To provide any illegal gambling, real money gambling, payday lending or sports betting;
  5. To engage in political or election campaigning or lobbying, including creating campaign materials personalized for or targeted to specific groups;
  6. Creating or promoting false information, misinformation, or other intentionally misleading content.
  7. Any use that is considered “high-risk” under relevant AI laws, including but not limited to using an AI Product for: biometric identification and classification; emotional recognition; as a safety component in critical infrastructure or in a product; determining access to education and vocational training; recruitment, monitoring or terminating employment of individuals; making a creditworthiness assessment or establishing a credit score; assessing risk or pricing for life and health insurance; or evaluating eligibility for essential services.