BLOG
CONTACT
BLOG
CONTACT

Acceptable Use Policy

Effective: January 10, 2026

This Acceptable Use Policy ("AUP") applies to all use of Martian Learning, Inc.'s ("Martian") services, including its API, by customers, developers, and end users (collectively, "Users"). Capitalized terms not defined herein have the meanings given in the applicable agreement between User and Martian.

Martian's services may send requests to third-party model providers ("Model Providers"). By using Martian's services, you agree to comply with this AUP. Violation may result in throttling, suspension, or termination of access.

Martian reserves the right to update this AUP as our services and the associated risks evolve.

1. General Obligations

1.1 Comply with Applicable Law. Users must comply with all applicable laws and regulations in connection with their use of the Services, including export controls, sanctions, and industry-specific regulations applicable to the User's sector or jurisdiction.

1.2 Comply with Model Provider Policies. Model Providers maintain their own acceptable use or usage policies. Users must comply with the applicable policies of each Model Provider whose models they access through the Services. Martian reserves the right to block, filter, or refuse any request that, in Martian's reasonable judgment, violates or would cause Martian to violate a Model Provider's acceptable use policy.

1.3 Responsibility for End Users. Users are responsible for ensuring that their end users comply with this AUP. A User's violation of this AUP through the acts of its end users will be treated as a violation by the User.

1.4 Disclosure of AI Use. Users must clearly disclose to their end users when content is generated by or with the assistance of AI, including the potential limitations of AI-generated content. This disclosure is required in all of the following contexts:

(a) Customer-facing chatbots, virtual assistants, or any external-facing interactive AI agent.

(b) Products or services that serve minors.

(c) Any other context where applicable law or Model Provider policy requires such disclosure.

1.5 National Security and Intelligence Use. Use of the Services for national security, intelligence, or defense purposes requires Martian's prior written approval.

2. Prohibited Uses

Users may not use Martian's services, or any outputs generated through them, for any of the following:

2.1 Illegal Activity

(a) Engaging in, facilitating, or promoting any activity that violates applicable law, including the production, synthesis, distribution, or trafficking of illegal or controlled substances, goods, or services.

(b) Facilitating human trafficking, forced labor, prostitution, or any other form of exploitation.

(c) Violating intellectual property laws, including copyright, trademark, trade secret infringement, or right of publicity violations.

(d) Engaging in or facilitating fraud, scams, phishing, identity theft, spoofing, or social engineering.

(e) Espionage, stalking, hacking, doxing, or unauthorized surveillance, tracking, or monitoring of individuals.

(f) Facilitating the production, acquisition, or distribution of counterfeit goods.

(g) Real money gambling.

(h) Operating in a regulated industry or jurisdiction without complying with applicable regulations.

2.2 Harm to Persons

(a) Threatening, intimidating, harassing, bullying, defaming, shaming, or celebrating the suffering of individuals or groups, or coordinating such conduct.

(b) Promoting, facilitating, inciting, or providing instructions for violence, terrorism, or violent extremism, including hate-based violence, or depicting support for violent extremist organizations or individuals.

(c) Developing, designing, procuring, marketing, distributing, or providing instructions for the use of weapons, explosives, or CBRNE (chemical, biological, radiological, nuclear, or explosive) agents, including conventional weapons, bioweapons, chemical weapons, and weapons of mass destruction.

(d) Promoting or facilitating self-harm, suicide, or disordered eating, or facilitating the concealment of such conduct.

(e) Generating content depicting sexual violence, non-consensual intimate imagery, animal cruelty or abuse, or gratuitous gore, including content inspired by real acts of violence.

(f) Promoting discrimination, hatred, or hate speech based on race, ethnicity, religion, nationality, gender, sexual orientation, disability, or any other protected characteristic.

(g) Destroying or damaging property, or facilitating the destruction or damage of property.

(h) Taking unauthorized actions on behalf of others.

(i) Developing products or services that use subliminal, manipulative, or deceptive techniques designed to distort behavior, impair decision-making, or cause emotional harm.

2.3 Child Safety

(a) Creating, distributing, or promoting child sexual abuse material (CSAM), whether or not AI-generated. Martian will report suspected CSAM to the National Center for Missing and Exploited Children (NCMEC) and other relevant authorities.

(b) Facilitating the grooming, trafficking, sextortion, or any other exploitation or sexualization of minors, including generating content designed to impersonate a minor.

(c) Generating sexual, violent, or otherwise age-inappropriate content involving or targeting minors, including underage sexual or violent roleplay.

(d) Facilitating or depicting child abuse of any form, including providing instructions for how to conceal abuse.

(e) Promoting or facilitating pedophilic relationships, including via roleplay, or fetishizing minors.

(f) Promoting unhealthy dieting, exercise behavior, or body image to minors, or shaming or stigmatizing the body type or appearance of minors.

(g) Promoting or facilitating dangerous challenges for minors.

(h) Facilitating underage access to age-restricted goods, services, or activities.

2.4 Privacy and Identity

(a) Collecting, disclosing, or misusing personal information without authorization or in violation of applicable privacy laws, including biometric data, neural data, health data, financial data, non-public contact information, or other sensitive or confidential data.

(b) Tracking or monitoring individuals without their consent.

(c) Building facial recognition databases without data subject consent.

(d) Conducting real-time remote biometric identification in public spaces.

(e) Using an individual's likeness (including photorealistic images or deepfakes), voice, or identity without consent in a manner that could deceive others as to authenticity, or depicting likenesses in a pornographic manner without consent.

(f) Evaluating, scoring, classifying, or profiling individuals based on social behavior, personal traits, or biometric data, including social scoring or inferring sensitive attributes.

(g) Inferring emotions in workplace or educational settings, except where necessary for medical or safety purposes.

(h) Assessing or predicting the risk of an individual committing a criminal offense based solely on personal traits or profiling.

(i) Impersonating a real person or entity, or presenting AI-generated results as human-generated, with the intent or effect of misleading others about the origin or nature of the content.

2.5 Misinformation and Deception

(a) Creating or distributing materially false or misleading content with the intent to deceive, including disinformation targeting individuals, groups, or institutions.

(b) Creating or distributing false or misleading information about laws, regulations, procedures, practices, or standards established by any institution or governing body.

(c) Creating or distributing false or misleading medical, health, or scientific information.

(d) Generating deceptive content such as fake reviews, fraudulent testimonials, misleading media, or conspiratorial narratives targeting specific groups, individuals, or entities.

(e) Facilitating misleading claims of expertise or capability in sensitive areas (e.g., health, finance, government services, or law) in order to deceive.

(f) Providing tailored professional advice that requires a license (such as legal, medical, or financial advice) without appropriate involvement by a licensed professional.

(g) Engaging in or facilitating academic dishonesty or plagiarism.

2.6 Elections and Political Processes

(a) Interfering with elections or democratic processes, including voter suppression, vote manipulation, demobilization activities, or disruption of electoral infrastructure (including voting machines and vote counting/certification systems).

(b) Generating false or misleading information about election procedures, election security, candidates, or voting rights.

(c) Engaging in political campaigning, lobbying, or advocacy designed to influence government officials, legislators, or regulatory agencies through deceptive or manipulative means.

2.7 Critical Infrastructure and Security

(a) Disrupting, damaging, or gaining unauthorized access to critical infrastructure, including power grids, water treatment facilities, telecommunications networks, air traffic control systems, healthcare systems and databases, financial markets, voting systems, or military installations.

(b) Compromising the security, integrity, or availability of any computer system, network, device, software application, or communications system, including through the creation or distribution of malware, ransomware, denial-of-service tools, interception tools, or unauthorized firmware modifications.

(c) Facilitating spam, phishing, or any abuse of, harm to, interference with, or disruption of Martian's or others' infrastructure or services.

(d) Circumventing security measures, safety filters, guardrails, or abuse protections of Martian's services or any Model Provider's systems (including through jailbreaking or prompt injection), unless expressly authorized by Martian in writing (e.g., approved red-teaming).

2.8 Sexually Explicit Content

(a) Generating sexually explicit content, including pornography, depictions of sexual intercourse or sex acts, sexual fetish or fantasy content, erotic roleplay or chats, or content depicting incest or bestiality, unless the applicable Model Provider's policies expressly permit such content and the User complies with all applicable laws.

2.9 Fraudulent, Abusive, and Predatory Practices

(a) Facilitating multi-level marketing, pyramid schemes, or other deceptive business models that exploit participants.

(b) Promoting or facilitating payday loans, title loans, or other predatory lending practices that exploit vulnerable individuals.

(c) Facilitating abusive or harassing debt collection practices.

(d) Engaging in deceptive, abusive, or manipulative practices that exploit individuals due to their age, disability, or social or economic situation.

(e) Facilitating the development or promotion of fraudulent or deceptive products or services.

2.10 Law Enforcement, Surveillance, and Criminal Justice

(a) Using the Services for official law enforcement applications, except for the following permitted uses:

(i) Back-office uses, including internal training, call center support, document summarization, and accounting.

(ii) Analysis of data for the location of missing persons, including in human trafficking cases, provided that such applications do not violate or impair the liberty, civil liberties, or human rights of individuals.

(b) Using the Services for mass surveillance, censorship, or the systematic monitoring or profiling of individuals or populations.

2.11 High-Risk Automated Decisions

Making automated decisions that materially affect individuals' rights, access, or opportunities in the following domains without appropriate human oversight and review by a qualified professional:

(a) Employment, hiring, or termination.

(b) Credit, lending, insurance, or financial eligibility.

(c) Healthcare diagnosis, treatment, or triage.

(d) Legal proceedings, sentencing, or risk assessment.

(e) Housing eligibility.

(f) Education admissions, testing, or accreditation.

(g) Law enforcement, criminal justice, or predictive policing.

(h) Essential government services, benefits, immigration, or migration decisions.

(i) Product safety components.

(j) National security.

(k) Media or professional journalistic content published for external consumption.

2.12 Platform Abuse

(a) Circumventing account bans, rate limits, or access restrictions, including through the creation of multiple accounts or providing access to persons or entities that have been banned.

(b) Coordinating malicious activity across multiple accounts, or utilizing automation for account creation or spammy behavior.

(c) Using the Services to train AI models without authorization ("model scraping").

(d) Generating spam or engaging in automated abuse.

(e) Conducting unauthorized or unsolicited security or safety testing against Martian's systems or any Model Provider's systems.

(f) Providing access to the Services to persons or entities located in jurisdictions where the Services are not available, or in violation of applicable export controls or sanctions.

3. Enforcement

3.1 Monitoring. Martian may monitor use of the Services for compliance with this AUP. Users agree to cooperate with Martian in investigating suspected violations.

3.2 Remedies. If Martian determines, in its reasonable judgment, that a User has violated this AUP, Martian may take one or more of the following actions without prior notice:

(a) Issue a warning.

(b) Throttle, suspend, or terminate the User's access to the Services.

(c) Block specific requests or content.

(d) Report the violation to applicable law enforcement or regulatory authorities.

3.3 Appeals. Users may appeal enforcement actions by contacting support@withmartian.com.

3.4 Exceptions. Martian may, in its sole discretion, grant exceptions to specific provisions of this AUP for educational, documentary, scientific, artistic, or public-interest purposes where, in Martian's judgment, the benefits substantially outweigh the potential harms.

4. Reporting Violations

If you become aware of any use of Martian's services that violates this AUP, please report it to support@withmartian.com.

‍

Privacy Policy   |   Terms & Conditions | ACCEPTABLE USE POLICY
LINKEDIN
GITHUB
X