Acceptable Use Policy
Guidelines for appropriate use of Jetson's platform
Last updated: August 13, 2025
Purpose
This Acceptable Use Policy outlines the permitted and prohibited uses of Jetson's customer support analysis platform. By using our service, you agree to comply with these guidelines to ensure a safe and productive environment for all users.
Permitted Uses
Business Operations
- • Analyze your organization's legitimate customer support conversations
- • Generate insights to improve customer service quality
- • Create reports and analytics for internal business purposes
- • Integrate with approved third-party business tools (HelpScout, GitHub)
- • Share insights within your organization for business improvement
Data Processing
- • Process customer support data you have legitimate rights to analyze
- • Use generated insights to identify patterns and trends
- • Export your data and analysis results for business use
- • Create automated workflows based on conversation classifications
Prohibited Uses
IMPORTANT
Violation of these prohibited uses may result in immediate account suspension or termination without prior notice.
Illegal Activities
- • Any use that violates local, state, national, or international law
- • Processing data obtained through illegal or unauthorized means
- • Violating privacy laws (GDPR, CCPA, HIPAA, etc.)
- • Infringing on intellectual property rights
- • Facilitating fraud, identity theft, or financial crimes
Data Misuse
- • Processing personal data of minors without proper consent
- • Analyzing conversations you don't have legal rights to process
- • Sharing customer data with unauthorized parties
- • Using our service to build competing products or services
- • Attempting to de-anonymize or re-identify individuals
Technical Abuse
- • Reverse engineering, decompiling, or disassembling our software
- • Attempting to gain unauthorized access to our systems
- • Introducing malware, viruses, or malicious code
- • Overloading our servers or disrupting service availability
- • Circumventing usage limits or security measures
Harmful Content
- • Processing hate speech, discriminatory, or offensive content
- • Analyzing conversations containing threats or harassment
- • Using our service to spread misinformation
- • Processing content that promotes violence or illegal activities
- • Analyzing conversations involving explicit or inappropriate material
Data Responsibility
Your Obligations
- • Ensure you have proper rights to process all data uploaded to our service
- • Comply with applicable privacy laws and regulations
- • Obtain necessary consents for data processing where required
- • Implement appropriate data security measures on your end
- • Promptly report any suspected data breaches or security incidents
Sensitive Data
Exercise special care when processing sensitive personal information:
- • Health information (HIPAA compliance required)
- • Financial data (PCI DSS compliance required)
- • Children's information (COPPA compliance required)
- • Biometric data or special category data under GDPR
- • Government or classified information
Enforcement
Violation Response
When we become aware of potential violations, we may:
- • Issue warnings and require corrective action
- • Temporarily suspend account access
- • Permanently terminate accounts for serious violations
- • Report illegal activities to appropriate authorities
- • Seek legal remedies for damages or losses
Investigation Process
- • We investigate reported violations promptly and fairly
- • You may provide explanations or evidence during investigations
- • We consider context and intent when determining appropriate responses
- • Appeal processes are available for disputed enforcement actions
Reporting Violations
If you become aware of violations of this Acceptable Use Policy, please report them promptly:
Security Issues
Email: [email protected]
For: Data breaches, unauthorized access, technical vulnerabilities
Policy Violations
Email: [email protected]
For: Misuse of service, inappropriate content, illegal activities
Best Practices
Data Governance
- • Regularly review and audit your data processing activities
- • Implement data retention and deletion policies
- • Train team members on proper data handling procedures
- • Document your legal basis for data processing
- • Conduct privacy impact assessments for high-risk processing
Security Practices
- • Use strong, unique passwords and enable two-factor authentication
- • Regularly update and patch your systems and software
- • Limit access to sensitive data on a need-to-know basis
- • Monitor for unusual activity or unauthorized access attempts
- • Maintain current backups and test recovery procedures
Updates to This Policy
We may update this Acceptable Use Policy to reflect changes in our service, applicable laws, or industry best practices. We will provide reasonable notice of material changes and may require renewed acceptance of updated terms.
Contact Information
Policy Questions
Email: [email protected]
Subject: Acceptable Use Policy Inquiry
Compliance Support
Email: [email protected]
For: GDPR, HIPAA, and other compliance guidance