§ 1Prohibited Uses
You may not use the Software, in whole or in part, directly or indirectly, in connection with:
- Child sexual abuse material (CSAM) in any form, including generation, processing, classification, retrieval, distribution, or evaluation. This is a non-negotiable, zero-tolerance restriction.
- Material support for terrorism, including planning, recruitment, financing, or coordination of acts of violence intended to intimidate civilian populations.
- Design, development, production, or use of weapons of mass destruction, including nuclear, chemical, biological, or radiological weapons, or missile systems intended to deliver such weapons.
- Targeting protected populations for harassment, harm, or disenfranchisement on the basis of race, ethnicity, religion, gender, sexual orientation, gender identity, disability, or other protected characteristic.
- Election interference, including the production or distribution of fraudulent election material, manipulation of voter registration data, or coordinated inauthentic behavior intended to suppress voter participation.
- Non-consensual deepfakes or synthetic intimate imagery of identifiable individuals.
- Fraud and financial crimes, including identity theft, account takeover, payment fraud, securities fraud, or money laundering.
- Stalkerware, spyware, or surveillance of individuals without their consent in jurisdictions where such surveillance is unlawful.
- Malware development or distribution, including code intended to damage, disrupt, or gain unauthorized access to computer systems.
- Violation of applicable export-control or sanctions laws as described in the Software License Agreement § 14.
§ 2Restricted Uses (require additional contractual agreement)
The following uses are not categorically prohibited but require a written rider to Your Order Form documenting Your governance, oversight, and risk-mitigation framework:
- High-risk AI systems within the meaning of the EU AI Act Article 6 (e.g., biometric identification, critical infrastructure management, employment screening, credit scoring, law-enforcement risk assessment, migration management);
- Autonomous medical diagnosis without licensed clinician oversight;
- Autonomous legal advice rendered to consumers as a substitute for licensed counsel;
- Autonomous financial advice rendered to consumers as a substitute for licensed advisors;
- Government surveillance applications targeting domestic civilian populations.
§ 3Customer Enforcement Obligation
Because the Software is self-hosted, Veklom does not monitor and cannot prevent prohibited uses within Your environment. You are responsible for:
- Communicating this Policy to all employees, contractors, and end users with access to the Software;
- Configuring Your deployment, access controls, and content-filtering measures to enforce this Policy;
- Investigating reports of prohibited use within Your organization;
- Cooperating with law enforcement where prohibited use rises to the level of a criminal offense.
§ 4Reporting Abuse
If You become aware of any prohibited use of the Software by a third party — for example, a Customer using the Software in a manner that constitutes child exploitation, terrorism support, or weapons-of-mass-destruction design — please report it to [email protected]. We will cooperate with law enforcement to the maximum extent permitted by applicable law and may take steps to terminate the offending license.
§ 5Consequences of Violation
Violation of this Policy is a material breach of the Software License Agreement. Veklom may, at its sole discretion:
- Suspend Updates and Support immediately;
- Terminate the Subscription with no refund of Fees paid;
- Terminate the perpetual license to the Acquired Version under Software License Agreement § 13.4;
- Cooperate with law enforcement investigations;
- Pursue any other remedy available at law or in equity.
§ 6Modifications
Veklom may update this Policy with at least thirty (30) days' notice to active Subscribers. Material changes that expand the scope of prohibited uses become effective on the next renewal cycle.
Abuse reports: [email protected] · Compliance questions: [email protected]