Acceptable Use Policy
Rules governing how you may access and use Mor's products and services.
This Acceptable Use Policy (“AUP”) governs all access to and use of the products, services, applications, websites, APIs, systems, software, artificial intelligence features, communications, outputs, and infrastructure provided by Mor Labs, Inc. (“Mor,” “we,” “us,” or “our”).
This AUP is incorporated by reference into and forms part of the Mor Terms of Service (the “Terms”). Capitalized terms not defined here have the meanings given in the Terms.
If there is any conflict between this AUP and the Terms, then, for purposes of acceptable use, safety, platform integrity, and enforcement, the provision that is more protective of users, third parties, the Service, or Mor’s legitimate safety, legal, and integrity interests will govern. The Terms otherwise govern all aspects of the relationship.
By accessing or using the Service, you agree to comply with this AUP.
1. Scope and Application
This AUP applies to all users, organizations, developers, customers, visitors, and other persons or entities accessing or using the Service, whether directly or indirectly, manually or through automated, assisted, programmatic, or embedded means.
It applies to all accounts, subscriptions, trials, beta access, devices, credentials, networks, integrations, prompts, inputs, outputs, content, communications, and interactions involving Mor systems.
You are responsible for all activity conducted through your account, credentials, devices, access keys, organization, integrations, or agents, whether performed by you or by someone acting with or through your access.
2. Core Rule
You may use the Service only in a lawful, authorized, safe, honest, and policy-compliant manner.
You may not use the Service in any way that harms or endangers any person, violates rights, compromises privacy or security, undermines trust, interferes with platform integrity, disrupts lawful operations, misuses third-party content, or exposes Mor, its users, or third parties to abuse, fraud, legal risk, or safety risk.
3. Definitions
For purposes of this AUP:
“Service” means all Mor products, applications, websites, APIs, software, models, artificial intelligence systems, features, outputs, communications, and supporting infrastructure.
“Content” means any text, data, media, prompts, inputs, messages, files, links, metadata, or other materials submitted to, generated by, transmitted through, accessed through, or displayed through the Service.
“Outputs” means any summaries, responses, analyses, recommendations, classifications, extractions, or results generated by the Service.
“Automated Access” means any access or interaction using scripts, bots, crawlers, scrapers, browser automation, headless browsers, agents, orchestration frameworks, robotic process automation, or substantially similar technologies, regardless of appearance, speed, intent, or claimed supervision.
“Security Measures” means any technical, procedural, or operational safeguard used by Mor, including authentication controls, permissions, rate limits, anti-abuse systems, monitoring systems, anomaly detection, integrity controls, moderation systems, filters, friction mechanisms, and access restrictions.
“Publicly Accessible” does not mean unrestricted, licensed, permitted, or authorized for copying, extraction, reuse, or exploitation.
“Attempt,” “Enable,” “Facilitate,” “Circumvent,” and similar terms include direct and indirect conduct intended to achieve a prohibited result, whether successful or not.
“Bulk” means any quantity, frequency, pattern, or aggregation of access, extraction, reproduction, storage, reuse, or redistribution that Mor reasonably determines exceeds ordinary permitted individual use, taking into account volume, repetition, automation, coordination, impact, and practical substitutability.
4. Prohibited Uses
You may not, and may not attempt to, facilitate, enable, assist, instruct, or encourage others to, engage in any of the following:
4.1 Illegal, Harmful, Fraudulent, or Abusive Conduct
- Violating any applicable law, regulation, court order, sanctions regime, regulatory requirement, or legally binding obligation.
- Engaging in fraud, deception, impersonation, forgery, identity misuse, or material misrepresentation.
- Harassing, threatening, bullying, intimidating, stalking, exploiting, abusing, or coercing any person or group.
- Promoting, facilitating, or glorifying violence, violent threats, terrorism, trafficking, exploitation, or criminal conduct.
- Promoting or facilitating suicide, self-harm, eating-disorder encouragement, or other severe physical or psychological harm.
- Using the Service to target, degrade, or endanger minors or other vulnerable persons.
- Creating, transmitting, requesting, or distributing content involving sexual exploitation, child sexual abuse material, grooming, or exploitative sexual conduct of any kind.
4.2 Privacy, Safety, and Rights Violations
- Doxxing, exposing, or distributing personal, confidential, or sensitive information without authorization.
- Invading privacy, conducting unauthorized surveillance, tracking, profiling, or recording, or facilitating the same.
- Using the Service to obtain, infer, expose, or weaponize sensitive personal information unlawfully or unfairly.
- Infringing intellectual property rights, publicity rights, privacy rights, contractual rights, database rights, or other third-party rights.
- Misrepresenting the source, authorship, origin, endorsement, or authenticity of content, media, outputs, or identities.
- Using the Service to bypass paywalls, access controls, license restrictions, or other lawful restrictions on third-party content.
4.3 Security, Access, and System Abuse
- Gaining or attempting to gain unauthorized access to any account, system, environment, data, model, network, credential, or infrastructure.
- Probing, scanning, testing, enumerating, or bypassing Security Measures without Mor’s express written authorization.
- Conducting credential stuffing, brute-force attacks, token abuse, session hijacking, account compromise, or similar attacks.
- Introducing malware, spyware, ransomware, malicious code, destructive payloads, or other harmful components.
- Using the Service to store, transmit, launch, coordinate, or conceal malicious or unauthorized activity.
4.4 Interference, Manipulation, and Evasion
- Disrupting, degrading, overloading, impairing, or interfering with the Service or any related infrastructure.
- Circumventing rate limits, quotas, safety restrictions, access controls, identity checks, account limits, or anti-abuse measures.
- Manipulating recommendations, rankings, visibility systems, engagement metrics, analytics, moderation signals, or system behavior.
- Creating, rotating, purchasing, renting, or coordinating accounts, devices, proxies, phone numbers, credentials, or identities to evade restrictions, detection, review, or enforcement.
- Suppressing, obscuring, or falsifying origin, attribution, referral, or usage information.
4.5 Automated Access, Scraping, Extraction, and Dataset Building
Unless Mor expressly authorizes it in writing, you may not, directly or indirectly, including through any third party:
- Use Automated Access to access or interact with the Service.
- Scrape, crawl, harvest, extract, monitor, index, copy, or collect Content, Outputs, metadata, page structure, or other information from the Service.
- Collect, store, compile, normalize, enrich, transform, or build datasets derived in whole or in part from the Service or its Outputs.
- Mirror, archive, reproduce, redistribute, syndicate, publish, or make available the Service or its Outputs in Bulk.
- Use the Service as an input, feed, corpus, benchmark, retrieval source, or training source for any external product, database, model, or service.
- Use any method designed to resemble human browsing, avoid detection, distribute requests, or reduce the likelihood of being identified as automated access.
These restrictions apply whether or not content appears publicly accessible and whether or not the method is fast, slow, supervised, intermittent, browser-based, or technically sophisticated.
4.6 Reverse Engineering, Model Extraction, and Competitive Misuse
You may not:
- Reverse engineer, decompile, disassemble, translate, reconstruct, or attempt to derive the source code, underlying models, prompts, classifiers, embeddings, ranking systems, logic, architecture, structure, or design of the Service.
- Perform model extraction, prompt extraction, parameter inference, latent-space probing, output harvesting, benchmark farming, or similar techniques intended to reveal or replicate the Service.
- Use the Service or Outputs to build, train, fine-tune, benchmark, evaluate, or improve any competing or substitute product or service.
- Replicate, imitate, white-label, repackage, or otherwise commercialize Mor’s core functionality or service architecture.
Any legally required exception applies only to the minimum extent strictly mandated by law. No exception permits bypassing Security Measures or conducting security testing without Mor’s express written authorization.
4.7 Spam, Promotions, Deceptive Influence, and Inauthentic Activity
You may not use the Service for:
- Spam, unsolicited outreach, mass messaging, repetitive promotions, or deceptive advertising.
- Astroturfing, coordinated inauthentic behavior, engagement manipulation, fake amplification, suppression campaigns, or deceptive influence operations.
- Impersonation-based persuasion, micro-targeted manipulation, or materially misleading political, civic, financial, reputational, or public-interest campaigns.
- Coordinating abuse, brigading, mass-reporting abuse, or targeted harassment.
4.8 AI-Specific Misuse
You may not:
- Attempt jailbreaks, prompt injection, poisoning, adversarial manipulation, safety bypassing, or model-extraction techniques.
- Use the Service or Outputs to facilitate fraud, impersonation, deception, unlawful profiling, unlawful discrimination, or evasion of safeguards on Mor or any other platform.
- Present AI-generated outputs as verified facts, human-authored statements, or authoritative determinations when doing so would be misleading or harmful.
- Deploy Outputs in automated decision-making systems that materially affect individuals without appropriate human oversight, applicable legal compliance, and adequate safeguards.
- Use the Service to generate, refine, or scale abusive campaigns, exploitative content, or prohibited synthetic or deceptive media.
Mor may label, refuse, suppress, restrict, remove, or decline to generate content, prompts, inputs, outputs, accounts, or interactions that violate this AUP or that create safety, security, legal, rights, trust, or platform-integrity concerns.
4.9 Third-Party Content, Publisher Protections, and Source Integrity
You may not:
- Reproduce, store, distribute, or build derivative datasets from third-party content accessed through the Service except as expressly authorized.
- Misappropriate publisher content, source metadata, attribution, or rights-managed materials.
- Use the Service to defeat publisher restrictions, remove attribution, or obscure source relationships.
- Misstate the provenance of reporting, analysis, media, or source material surfaced by the Service.
You are responsible for complying with third-party terms, licenses, permissions, and applicable law when using or relying on third-party content.
4.10 Sanctions, Export Controls, and Restricted Uses
You may not use the Service in violation of export controls, sanctions laws, embargoes, restricted-party rules, anti-boycott rules, or other applicable trade restrictions.
5. Account Integrity and Credential Security
You must provide accurate account information where required, maintain the security of your credentials, use reasonable measures to prevent unauthorized access, and notify Mor promptly of any suspected compromise, misuse, circumvention, or unauthorized activity involving your account or the Service.
You remain responsible for activity conducted through your account or access unless and until Mor has been properly notified and had a reasonable opportunity to act.
6. Moderation, Reporting, User Protections, and Safety Measures
Mor may use technical, automated, manual, human-assisted, and policy-based measures to detect, prevent, filter, flag, review, restrict, label, remove, or otherwise address objectionable material, abusive conduct, unsafe interactions, policy violations, legal risks, security threats, and platform-integrity threats where applicable.
These measures may include proactive and reactive systems, including filters, integrity checks, abuse detection, risk scoring, throttling, friction, visibility limitations, content restrictions, feature restrictions, account review, and other safeguards that Mor determines are appropriate.
Users may report content, accounts, messages, outputs, behavior, safety concerns, legal concerns, rights violations, or other suspected violations through designated in-product tools, reporting flows, support channels, or policy contact pathways made available by Mor.
Mor reviews reports in a timely manner and may prioritize matters involving child safety, threats of violence, exploitation, urgent security issues, repeated abuse, legal process, or other elevated-risk circumstances. Mor may take action where it determines action is appropriate.
Where relevant user-interaction features are available in the applicable service, Mor may provide users with controls that allow them to block, mute, hide, limit, or otherwise reduce unwanted interactions, content, or abusive users.
Mor may preserve records, evidence, and related information as reasonably necessary to investigate reports, enforce its policies, comply with law, protect users, protect third parties, or protect the Service.
7. Monitoring, Investigations, and Enforcement Discretion
Mor may, but is not required to, monitor, screen, review, moderate, investigate, or audit use of the Service, Content, Outputs, accounts, integrations, or behavior for purposes of safety, security, legal compliance, integrity, quality, abuse prevention, or enforcement.
Mor does not undertake a duty to monitor all content or activity, and the absence of monitoring, screening, or enforcement in any instance does not waive any right to act later or in other circumstances.
Mor may initiate investigations based on reports, automated signals, internal review, third-party notices, legal process, trust-and-safety referrals, security findings, or any other information it considers relevant.
8. Enforcement and Remedies
Mor may take any action it reasonably determines is appropriate, subject to applicable law and platform needs, with or without prior notice, including:
- removing, disabling, restricting, suppressing, or refusing Content, prompts, inputs, Outputs, features, or interactions;
- issuing warnings or requiring corrective action;
- limiting visibility, distribution, reach, functionality, or access;
- applying age-gates, labels, interstitials, or other safety or context mechanisms where relevant;
- throttling usage, imposing technical limits, or restricting integrations or automation;
- suspending, disabling, or terminating accounts temporarily or permanently, in whole or in part;
- blocking or restricting devices, sessions, credentials, payment methods, domains, integrations, IP addresses, or networks where lawful and appropriate;
- preserving evidence or account records;
- referring matters to law enforcement, regulators, rights holders, platform partners, or other appropriate parties; and
- pursuing contractual, injunctive, equitable, or other legal remedies.
Mor may enforce this AUP based on reasonable belief, risk assessment, policy judgment, available evidence, or failure to provide information reasonably requested during a review.
9. Reporting, Reviews, and Appeals
Reports may be submitted through Mor’s designated reporting and support channels. Mor may request additional information where useful to assess a report or review.
Mor may review, investigate, respond to, or prioritize reports in the manner it determines is appropriate under the circumstances. Mor does not guarantee a particular response time, review format, reviewer type, process, outcome, or level of explanation.
If Mor offers a review, reconsideration, or appeal process in a particular context, that process is discretionary, may be limited by law, safety, privacy, abuse-prevention, or operational considerations, and does not create any ongoing duty or waiver of rights.
10. Updates to This Policy
Mor may modify this AUP from time to time. Changes become effective upon posting or upon any later effective date stated in the updated policy. Your continued use of the Service after the effective date of an updated AUP constitutes acceptance of the revised policy to the extent permitted by applicable law.
11. Governing Framework
This AUP is governed and enforced under the Mor Terms of Service, including provisions addressing governing law, jurisdiction, dispute resolution, disclaimers, and limitations of liability.
Contact and Related Resources
For questions about this Acceptable Use Policy, acceptable use reviews, policy interpretation, reporting pathways, or how these rules apply to a proposed use of the Service, contact Mor through the appropriate channel below.
- Legal and policy inquiries: Contact Legal Team
- Safety, abuse, or policy violation reports: Report Violation
- General trust and safety information: Trust & Safety
If you are unable to use a contact form, you may email legal@themorapp.com.
Related resources:
Contact the Legal Team
For questions about this Acceptable Use Policy, acceptable use reviews, policy interpretation, reporting pathways, or how these rules apply to a proposed use of the Service, contact the Legal Team.
If you are unable to use this form, you may email legal@themorapp.com.