Acceptable Use Policy
This acceptable use policy covers the products, services, and technologies (collectively referred to as the "Products") provided by Korely under any ongoing agreement. It is designed to protect us, our customers, and the general Internet community from unethical, irresponsible, and illegal activity.
Korely customers found engaging in activities prohibited by this acceptable use policy can be liable for service suspension and account termination. In extreme cases, we may be legally obliged to report such customers to the relevant authorities.
Fair Use
We provide our facilities with the assumption your use will be "business as usual", as per our offer schedule. If your use is considered to be excessive, then additional fees may be charged or capacity may be restricted.
We are opposed to all forms of abuse, discrimination, rights infringement, and any action that harms or disadvantages any group, individual, or resource. We expect our customers and, where applicable, their users ("end-users") to likewise engage our Products with similar intent.
Customer Accountability
We regard our customers as being responsible for their own actions as well as for the actions of anyone using our Products with the customer's permission. This responsibility also applies to anyone using our Products on an unauthorised basis as a result of the customer's failure to put in place reasonable security measures.
By accepting Products from us, our customers agree to ensure adherence to this policy on behalf of anyone using the Products as their end users. Complaints regarding the actions of customers or their end-users will be forwarded to the nominated contact for the account in question.
If a customer (or their end-user, or anyone using our Products as a result of the customer) violates our acceptable use policy, we reserve the right to terminate any Products associated with the offending account or the account itself, or take any remedial or preventative action we deem appropriate without notice. To the extent permitted by law, no credit will be available for interruptions of service resulting from any violation of this acceptable use policy.
Prohibited Activity
Copyright Infringement and Access to Unauthorized Material
Our Products must not be used to transmit, distribute, or store any material in violation of any applicable law. This includes but is not limited to:
- any material protected by copyright, trademark, trade secret, or other intellectual property right used without proper authorisation;
- any material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
The customer is solely responsible for all material they input, upload, disseminate, transmit, create, or publish through or on our Products, and for obtaining legal permission to use any works included in such material.
Spam and Unauthorized Message Activity
Our Products must not be used for the purpose of sending unsolicited bulk or commercial messages in violation of the laws and regulations applicable to your jurisdiction ("spam"). This includes but is not limited to sending spam, soliciting customers from spam sent from other service providers, and collecting replies to spam sent from other service providers.
Our Products must not be used for the purpose of running unconfirmed mailing lists or telephone number lists ("messaging lists"). All messaging lists run on or hosted by our Products must be "confirmed opt-in". Verification of the address or telephone number owner's express permission must be available for the lifespan of the messaging list.
We prohibit the use of email lists, telephone number lists, or databases purchased from third parties intended for spam or unconfirmed messaging list purposes on our Products.
This spam and unauthorised message activity policy applies to messages sent using our Products, or to messages sent from any network by the customer or any person on the customer's behalf, that directly or indirectly refer the recipient to a site hosted via our Products.
Unethical, Exploitative, and Malicious Activity
Our Products must not be used for the purpose of advertising, transmitting, or otherwise making available any software, program, product, or service designed to violate this acceptable use policy, or the acceptable use policy of other service providers. This includes but is not limited to facilitating means to send spam, network sniffing, pinging, packet spoofing, flooding, mail-bombing, and denial-of-service attacks.
Our Products must not be used to access any account or electronic resource where the group or individual attempting to gain access does not own or is not authorised to access the resource (e.g., unauthorised intrusion, "cracking", "phreaking").
Our Products must not be used for the purpose of intentionally or recklessly introducing viruses or malicious code into our Products and systems.
Our Products must not be used for purposely engaging in activities designed to harass another group or individual. Our definition of harassment includes but is not limited to denial-of-service attacks, hate speech, advocacy of racial or ethnic intolerance, and any activity intended to threaten, abuse, infringe upon the rights of, or discriminate against any group or individual.
Other activities considered unethical, exploitative, and malicious include:
- Obtaining (or attempting to obtain) services from us with the intent to avoid payment;
- Using our facilities to obtain (or attempt to obtain) services from another provider with the intent to avoid payment;
- The unauthorised access, alteration, or destruction (or any attempt thereof) of any information about our customers or end-users, by any means or device;
- Using our facilities to interfere with the use of our facilities and network by other customers or authorised individuals;
- Publishing or transmitting any content or links that incite violence, depict a violent act, depict the abuse of minors, or threaten anyone's health and safety;
- Any act or omission in violation of consumer protection laws and regulations;
- Any violation of a person's privacy.
Our Products may not be used by any person or entity that is involved with, or suspected of involvement in, activities or causes relating to illegal gambling, terrorism, narcotics trafficking, arms trafficking, or the proliferation, development, design, manufacture, production, stockpiling, or use of weapons restricted under international law, in each case including any affiliation with others who support such activities or causes.
Unauthorized Use of Korely Property
We prohibit the impersonation of Korely, the representation of a significant business relationship with Korely, or ownership of any Korely property (including our Products and brand) for the purpose of fraudulently gaining service, custom, patronage, or user trust.
Korely-Specific Prohibitions
In addition to the general prohibitions above, Users of Korely agree NOT to:
- (a) Use Korely's recording features to capture audio of any person who has not consented or who has explicitly objected, in any jurisdiction;
- (b) Use Korely's AI features to generate, train, or otherwise produce content that defames, harasses, or impersonates any natural person without their consent;
- (c) Use Korely as a covert surveillance tool against employees, family members, romantic partners, or other persons without their knowledge and consent;
- (d) Submit content to Korely that you do not have the legal right to process, including content protected by attorney-client privilege, medical confidentiality, or other professional duties of confidentiality, except where you are the holder of such privilege and your use complies with applicable rules;
- (e) Use Korely to evade tax obligations, hide assets, or otherwise facilitate financial crime;
- (f) Connect Korely's MCP (Model Context Protocol) interface to any third-party tool that you do not control or trust, in a manner that would expose Korely user data to abuse;
- (g) Reverse engineer Korely's source code beyond what is allowed by applicable law (e.g., interoperability research) without express written permission;
- (h) Resell, white-label, or sublicense the Korely service without express written permission.
Korely reserves the right to suspend or terminate accounts in violation of this Acceptable Use Policy, at its sole discretion, with or without notice, depending on the severity of the violation.
About This Policy
This policy outlines a non-exclusive list of activities and intent we deem unacceptable and incompatible with our brand.
We reserve the right to modify this policy at any time by publishing the revised version on our website. The revised version will be effective from the earlier of:
- the date the customer uses our Products after we publish the revised version on our website; or
- 30 days after we publish the revised version on our website.
Contact
To report a violation of this Acceptable Use Policy, or for any questions:
Korely Trust & Safety
Email: privacy@korely.ai
Operator: Massimiliano Martella (transferring to Korely SRL upon incorporation)
Address: Via della Bastia, 40033 Casalecchio di Reno (BO), Italia
See also: Privacy Policy - Terms of Service - Cookie Policy - Subprocessors
← Back to Korely