Acceptable Use Policy
This Chalk AI, Inc. (“Chalk”) acceptable use policy (“AUP”) sets forth certain terms, conditions and
restrictions relating to the access to, and use of, any products or services provided by Chalk (the
“Services”) by or on behalf of any Chalk.ai customer (“Customer”) under Customer’s agreement with
Chalk applicable to the Services (the “Agreement”). The restrictions set forth in this AUP are in
addition to those set forth in the Agreement (and in the event of any conflict between any provision
of this AUP and any provision of the Agreement, the provision that is more protective of Chalk and
the Services shall control). Any capitalized terms used but not defined herein shall have the
meaning set forth in the Agreement. This AUP may be updated by Chalk from time-to-time upon
reasonable notice (e.g., via email, through the Services or by posting an updated version of this
AUP). Updates of the AUP become binding, including on existing users, on the later of the date
specified in the updated AUP or thirty (30) days after posting. Any violation of this AUP may result
in the suspension or termination of Customer’s access to and use of the Chalk Services.
Customer shall not (and shall not permit its authorized users to):
- attempt to access, search, or create accounts for any of Chalk’s services by any means other than
Chalk’s publicly supported interfaces or as otherwise authorized by Chalk;
- interfere with or disrupt (or attempt to interfere with or disrupt) the Services, or gain (or
attempt to gain) access to any Systems that connect thereto (except as required to appropriately
access, deploy, maintain, or use the Services);
- use the Chalk Services to violate the security or integrity of, or otherwise abuse, any System of
any party (including without limitation the Services), including but not limited to gaining
unauthorized access to any System (including attempting to probe, scan, monitor, or test the
vulnerability of a System), forging any headers or other parts of any message describing its
origin or routing, interfering with the proper functioning of any System (including any deliberate
attempt by any means to maliciously overload a System), implementing denial-of-service attacks,
operating non-permissioned network services (including open proxies, mail relays or recursive
domain name servers), using any means to bypass System usage limitations, or storing, transmitting
or installing malicious code;
- use the Services to engage in or promote any other fraudulent, deceptive or illegal activities;
- use the Services to process, store or transmit material, including any Customer Data, in violation
of any law or any third party rights, including without limitation privacy rights;
- disclose to any third party (1) the results of any testing or benchmarking of the Services that
Customer might conduct or (2) the results of any other performance-related statistics pertaining
to the Services; or
- use the Services in any circumstances involving high-risk activities, including where failure
could lead to death, personal injury or environmental damage, and Customer further acknowledges
that the Services are not designed or intended for such use.