Acceptable Use Policy

Effective starting: 01 January, 2025

1. Overview

The following policies supplement the Dotwork Customer Agreement and govern specific aspects of the relationship between Dotwork and Customer.

At Dotwork, we are committed to maintaining a safe, respectful, and secure environment across all our products, services, and platforms. This policy outlines behaviors and activities that are prohibited when using Dotwork’s services, websites, subdomains, cloud platforms, and any other related offerings.

These security measures align with industry best practices, reinforcing compliance, trustworthiness, and customer confidence. This policy is structured to support Dotwork’s early-stage operations while being robust enough to secure partnerships, win deals, and scale security protocols as the company grows.

2. Prohibited Activities

2.1 Disrupting Services & Integrity

You may not engage in any activity that compromises the security, availability, or performance of Dotwork’s systems, networks, or services, including: a) unauthorized access or attempts to probe, scan, or test system vulnerabilities without Dotwork’s explicit permission, b) tampering, reverse-engineering, or attempting to bypass security or authentication measures, c) disrupting service operations by modifying, disabling, or degrading system performance, d) overloading infrastructure by sending excessive requests, such as through bots, scrapers, spiders, or automated scripts that exceed reasonable usage, or e) excessive storage use for media or other content unrelated to the intended purpose of the services.

2.2 Fraud, Misrepresentation, & Wrongful Activities

You may not: a) falsely represent yourself (e.g., impersonating others, misrepresenting identity, or manipulating metadata), b) violate privacy rights, including collecting, publishing, or sharing personal or confidential information without consent, c) engage in harassment, stalking, intimidation, bullying, or issuing threats of violence, d) violate laws, including data privacy, intellectual property, export controls, or other regulations, e) circumvent public access interfaces by scraping, indexing, or otherwise gathering data without authorization, f) use Dotwork’s name, trademarks, or brand identifiers in hidden text, meta tags, or misleading ways, or g) engage in deceptive or malicious activities, such as phishing, spoofing, or falsifying endorsements or sponsorships.

2.3 Inappropriate Communications & Unsolicited Content

You may not use Dotwork’s services to: a) send spam, chain letters, or bulk commercial solicitations without authorization, b) solicit Dotwork users for commercial purposes unless explicitly permitted, c) disparage, defame, or make false claims about Dotwork, its partners, vendors, or affiliates, including but not limited to false allegations, unverified claims designed to damage reputation, or intentional misinformation, or d) promote or advertise third-party products/services without prior approval.

2.4 Harmful, Illegal, or Inappropriate Content

You may not upload, share, or generate content that: a) infringes intellectual property rights (copyrights, trademarks, patents, or trade secrets), b) contains false, deceptive, misleading, or fraudulent information, c) is defamatory, obscene, sexually explicit, or exploitative, including child sexual abuse material (which will be reported to law enforcement), d) encourages or depicts violence, illegal activities, or other dangerous behavior, e) discriminates, harasses, or attacks individuals or groups based on race, ethnicity, national origin, religion, sex, disability, or other protected attributes, f) introduces malware, viruses, bots, worms, or similar harmful technologies, or g) has been previously removed for violating this policy.

3. Artificial Intelligence (AI) Offerings

When using AI-powered features, you must adhere to responsible AI use guidelines. The following activities are strictly prohibited: a) providing or seeking professional advice that would ordinarily require licensed experts, such as legal, medical, or financial guidance, b) making automated decisions with legal or significant personal impact (e.g., finance, credit, insurance, housing, employment, education, law enforcement), c) influencing political processes, including campaign materials or lobbying efforts, d) misleading users into believing AI-generated content was created by a human, e) circumventing AI safety measures or intentionally prompting AI to violate this policy, f) impersonating individuals or organizations without explicit authorization, g) facilitating plagiarism, fake reviews, academic dishonesty, or other deceptive practices, h) engaging in the development, promotion, or facilitation of AI services that enable erotic, romantic, or sexually explicit interactions.

4. Content Definition & Enforcement

4.1 Definition of Content

In this Acceptable Use Policy, “content” refers to: a) any data, text, software, scripts, images, videos, audio, graphics, messages, tags, interactive elements, or any other materials created, posted, uploaded, or shared through Dotwork’s services, b) any third-party content provided by individuals whom you have authorized to interact with Dotwork services on your behalf.

4.2 Enforcement

Dotwork reserves the right to interpret these guidelines and take action at its discretion. Violations may result in: a) temporary or permanent removal of prohibited content, b) suspension or termination of accounts, access, or services, c) Dotwork may take legal action to enforce compliance, prevent harm, or address unlawful activities.

Dotwork does not assume liability for any damages resulting from enforcement actions. Users are expected to cooperate in any investigation or remediation efforts.

5. Responsible & Ethical Use

This Acceptable Use Policy fosters a secure, respectful, and inclusive environment for all Dotwork users. We encourage responsible usage, ethical decision-making, and respect for others when using our services. By continuing to use Dotwork’s platforms, you acknowledge and agree to abide by this policy.

6. Audit & Accountability

a)  System activity logs are retained and monitored for anomalies.

b)  A centralized logging system continuously monitors security events for anomalies, triggering alerts when predefined risk thresholds are exceeded.

c)  All critical security incidents are thoroughly documented, reviewed, and used to improve response strategies.

7. Assessment, Authorization, & Monitoring

a)  Annual security assessments are conducted on key systems.

b)  Internal policy reviews occur biannually to align with evolving threats and best practices.

c)  A SOC 2 audit is scheduled for completion by May 1, 2025, with annual recertification thereafter.

d)  Regular vulnerability scans are conducted, with high-severity issues remediated within defined SLAs.