Skip to main content

Acceptable Use Policy

Last Updated: November 27, 2025Effective Date: November 27, 2025

1. INTRODUCTION

1.1 Purpose of This Policy

This Acceptable Use Policy ("AUP") governs your use of MegaLLM's unified API gateway service. This AUP is part of our Terms of Service and establishes clear guidelines for appropriate and responsible use of our Service.

1.2 Who This Applies To

This AUP applies to:

  • All users of the MegaLLM Service
  • Anyone who accesses the Service through API or web interface
  • Third parties acting on behalf of users
  • Applications and services built using MegaLLM

1.3 Agreement to This Policy

By using MegaLLM, you agree to comply with this AUP. Violation of this AUP may result in:

  • Warning and required corrective action
  • Temporary suspension of your account
  • Permanent termination of your account
  • Reporting to law enforcement (for illegal activities)
  • Legal action to enforce our rights

1.4 Relationship to Terms of Service

This AUP is incorporated into and forms part of our Terms of Service. Capitalized terms not defined here have the meanings given in the Terms of Service.

2. CORE PRINCIPLES

2.1 Lawful Use

You must use MegaLLM only for lawful purposes. You may not:

  • Violate any applicable local, state, national, or international law or regulation
  • Violate any rules or requirements of Model Providers
  • Engage in any activity that could expose MegaLLM or our users to legal liability

2.2 Respect for Others

You must respect the rights and dignity of others. You may not:

  • Harm, harass, threaten, or abuse any person or entity
  • Violate anyone's privacy, publicity, or other legal rights
  • Discriminate based on protected characteristics

2.3 Good Faith Use

You must use MegaLLM in good faith and not abuse the Service. You may not:

  • Attempt to circumvent usage limits, security measures, or billing systems
  • Use the Service in ways that harm MegaLLM, our users, or third parties
  • Exploit vulnerabilities or bugs for personal gain

2.4 Compliance with Model Provider Policies

You must comply with all applicable policies of Model Providers, including:

3. PROHIBITED USES

The following activities are strictly prohibited:

3.1 ILLEGAL ACTIVITIES

You may NOT use MegaLLM to:

A. Commit Crimes or Facilitate Criminal Activity

  • Plan, coordinate, or execute illegal activities
  • Facilitate fraud, theft, embezzlement, or money laundering
  • Engage in illegal gambling or betting operations
  • Violate export control or sanctions laws
  • Traffic or promote illegal drugs or controlled substances
  • Facilitate human trafficking or exploitation
  • Engage in illegal weapons trading
  • Participate in organized crime or terrorist activities

B. Violate Intellectual Property Rights

  • Infringe copyrights, trademarks, patents, or trade secrets
  • Distribute pirated software, media, or content
  • Generate works that plagiarize copyrighted content
  • Create fake documents, credentials, or certificates
  • Forge signatures or impersonate legal entities

C. Commit Fraud or Deception

  • Create or distribute phishing content
  • Generate fake reviews, testimonials, or ratings
  • Create deepfakes or synthetic media to deceive
  • Engage in identity theft or impersonation
  • Generate fraudulent financial documents
  • Create fake news or intentionally misleading information
  • Manipulate financial markets or securities

3.2 HARMFUL CONTENT GENERATION

You may NOT use MegaLLM to generate, distribute, or promote:

A. Content That Harms Children

  • Child sexual abuse material (CSAM) or child exploitation content
  • Content sexualizing, grooming, or endangering minors
  • Content facilitating child trafficking or abuse
  • Content that could be used to identify, locate, or contact minors

B. Violent or Graphic Content

  • Graphic depictions of violence or gore (except for legitimate educational or medical purposes)
  • Content glorifying or promoting violence
  • Instructions for creating weapons or explosives
  • Content promoting terrorism or extremist violence
  • Torture, cruelty, or abuse of humans or animals

C. Hateful or Discriminatory Content

Content promoting hate speech, discrimination, or harassment based on:

  • Race, ethnicity, or national origin
  • Religion or religious beliefs
  • Gender, gender identity, or sexual orientation
  • Disability or medical condition
  • Age, caste, or other protected characteristics
  • Content promoting hate groups, supremacist ideologies, or genocide
  • Content inciting violence or hatred against protected groups

D. Sexual Content

  • Non-consensual sexual imagery or deepfakes
  • Pornography or sexually explicit content (except for legitimate health education with appropriate safeguards)
  • Content facilitating sex trafficking or prostitution
  • Revenge porn or intimate image abuse
  • Content sexualizing fictional minors

E. Self-Harm and Dangerous Activities

  • Content promoting suicide, self-harm, or eating disorders
  • Content encouraging dangerous challenges or stunts
  • Instructions for methods of self-harm or suicide
  • Content promoting dangerous conspiracy theories (e.g., anti-vaccine misinformation that could cause harm)

3.3 PRIVACY AND SECURITY VIOLATIONS

You may NOT use MegaLLM to:

A. Violate Privacy

  • Collect, harvest, or scrape personal information without consent
  • Doxx individuals (publicly reveal private information)
  • Conduct surveillance, stalking, or tracking of individuals
  • Process personal data in violation of privacy laws (GDPR, CCPA, etc.)
  • Create or distribute malware, spyware, or surveillance tools

B. Compromise Security

  • Hack, penetrate, or test the security of systems without authorization
  • Distribute malware, viruses, ransomware, or trojans
  • Generate code for exploiting vulnerabilities
  • Create phishing sites or social engineering tools
  • Conduct brute force attacks, DDoS attacks, or similar attacks
  • Bypass security measures, content filters, or access controls

C. Abuse Data

  • Process sensitive personal data (health, financial, biometric) without appropriate safeguards
  • De-anonymize data or reverse engineer anonymization
  • Combine datasets to identify individuals
  • Trade or sell personal data without authorization

3.4 SPAM AND ABUSE

You may NOT use MegaLLM to:

A. Generate Spam or Unsolicited Communications

  • Send bulk unsolicited emails (spam)
  • Generate automated messages for social media or forums
  • Create fake accounts or bots for spamming
  • Conduct astroturfing or coordinated inauthentic behavior
  • Manipulate online engagement metrics (fake likes, follows, reviews)

B. Abuse Communication Channels

  • Harass, threaten, or abuse individuals via messages
  • Conduct email bombing or SMS flooding
  • Impersonate others in communications
  • Generate scam or phishing messages

3.5 PLATFORM ABUSE

You may NOT:

A. Abuse the Service Infrastructure

  • Exceed rate limits through distributed attacks or multiple accounts
  • Use the Service for cryptocurrency mining or similar tasks
  • Overload or disrupt the Service infrastructure
  • Attempt to gain unauthorized access to the Service or other accounts
  • Reverse engineer, decompile, or attempt to discover source code
  • Probe, scan, or test vulnerabilities without authorization

B. Circumvent Restrictions

  • Create multiple accounts to evade bans or usage limits
  • Share or resell API access without authorization
  • Use the Service to compete with MegaLLM
  • Bypass content filters or safety measures
  • Manipulate billing or payment systems

C. Misrepresent Usage

  • Provide false information about your use case
  • Violate terms after representing compliance
  • Use the Service for undisclosed purposes

3.6 MISINFORMATION AND MANIPULATION

You may NOT use MegaLLM to:

A. Create Deceptive Content

  • Generate deepfakes or synthetic media without clear disclosure
  • Create fake news or intentionally misleading information
  • Impersonate public figures, organizations, or brands
  • Generate false academic or scientific claims
  • Create fake credentials, certificates, or documents

B. Manipulate Public Discourse

  • Conduct coordinated inauthentic behavior
  • Manipulate elections or democratic processes
  • Create fake grassroots campaigns (astroturfing)
  • Spread disinformation campaigns
  • Manipulate financial markets through misinformation

C. Academic Misconduct

  • Generate essays or assignments for academic dishonesty
  • Create fake research data or citations
  • Plagiarize academic work
  • Violate academic integrity policies

(Note: Using AI for learning, tutoring, and educational purposes WITH APPROPRIATE DISCLOSURE is permitted)

3.7 HIGH-RISK USE CASES WITHOUT SAFEGUARDS

You may NOT use MegaLLM for the following high-risk applications without appropriate human oversight, safeguards, and professional supervision:

A. Medical and Health Applications

  • Medical diagnosis or treatment without physician review
  • Mental health counseling without licensed professional oversight
  • Prescription or medication recommendations
  • Crisis intervention or suicide prevention (without trained professionals)
  • Medical image interpretation for diagnosis

B. Legal Applications

  • Providing legal advice without attorney review
  • Drafting legal documents without lawyer supervision
  • Making legal determinations or judgments
  • Representing clients in legal proceedings

C. Financial Applications

  • Providing investment advice without licensed advisor review
  • Making automated trading decisions without human oversight
  • Underwriting loans or insurance without human review
  • Tax preparation without accountant review

D. Critical Infrastructure

  • Controlling critical infrastructure systems without extensive safeguards
  • Operating life support or medical devices
  • Controlling transportation systems (aviation, rail, autonomous vehicles)
  • Managing nuclear facilities or weapons systems

E. Civil Rights and Justice

  • Making sentencing or parole decisions
  • Automated hiring decisions without human review
  • Determining benefits eligibility without human oversight
  • Predictive policing without safeguards against bias
  • Immigration or asylum determinations

IMPORTANT: You may use MegaLLM for these applications ONLY if you:

  • Implement appropriate human oversight and review
  • Have qualified professionals supervise the system
  • Implement safeguards and redundancies
  • Clearly disclose AI involvement to end users
  • Comply with all applicable regulations and professional standards

3.8 MODEL PROVIDER SPECIFIC RESTRICTIONS

You must also comply with specific restrictions imposed by Model Providers. Common restrictions include:

OpenAI Models:

  • No use for regulated medical advice
  • No automated social media content generation without disclosure
  • No lobbying or political campaigning

Anthropic Models:

  • No use for mass surveillance
  • No automated decision-making affecting civil rights without human review
  • No manipulation of democratic processes

Google Models:

  • No use in weapons systems
  • No use to harm, deceive, or manipulate children

Meta Llama:

  • Llama models have specific use case restrictions
  • Commercial use may require additional licensing

Refer to Model Provider documentation for complete, up-to-date restrictions.

4. PERMITTED USES

MegaLLM may be used for many legitimate purposes, including:

4.1 Application Development

  • Building AI-powered applications and services
  • Integrating AI capabilities into existing software
  • Creating chatbots and conversational interfaces
  • Developing content generation tools

4.2 Business Operations

  • Customer support and service
  • Internal knowledge management
  • Business intelligence and analytics
  • Process automation and optimization
  • Marketing content creation (with appropriate disclosure)
  • Research and competitive analysis

4.3 Creative Work

  • Writing assistance (with proper attribution)
  • Brainstorming and ideation
  • Content drafting and editing
  • Translation and localization
  • Creative storytelling (fiction)
  • Art and design concepts

4.4 Education and Learning

  • Tutoring and educational assistance
  • Explaining complex concepts
  • Language learning
  • Study aids and summaries
  • Research assistance (with proper academic integrity)

4.5 Personal Use

  • Personal productivity and organization
  • Learning new skills
  • Hobby projects
  • Entertainment and exploration

4.6 Research and Development

  • Academic research (with ethical oversight)
  • Product development and testing
  • Innovation and experimentation
  • Data analysis and insights

BEST PRACTICES FOR PERMITTED USES:

  • Always disclose AI involvement where appropriate
  • Review and verify AI outputs before use
  • Implement human oversight for important decisions
  • Respect intellectual property rights
  • Comply with professional and industry standards
  • Use AI as a tool to augment, not replace, human judgment

5. RESPONSIBLE USE GUIDELINES

5.1 Output Verification

You are responsible for verifying AI outputs:

  • Review all AI-generated content before use
  • Fact-check important information
  • Verify legal, medical, or financial information with qualified professionals
  • Don't blindly trust AI outputs, especially for critical decisions

5.2 Transparency and Disclosure

Disclose AI involvement when appropriate:

  • In academic settings, follow your institution's AI use policies
  • For published content, disclose significant AI contributions
  • In professional contexts, follow industry disclosure standards
  • For synthetic media, clearly mark as AI-generated

5.3 Privacy Protection

Protect privacy when using MegaLLM:

  • Don't submit personal information of others without consent
  • Anonymize data when possible
  • Comply with data protection laws (GDPR, CCPA, etc.)
  • Implement appropriate data security measures

5.4 Bias Awareness

Be aware of potential biases in AI:

  • AI models may reflect biases from training data
  • Outputs may not be fair or balanced
  • Implement measures to detect and mitigate bias
  • Don't use AI for decisions with discriminatory impact without safeguards

5.5 Security Best Practices

Maintain security when using MegaLLM:

  • Keep API keys confidential and secure
  • Don't share account credentials
  • Implement rate limiting and monitoring
  • Report security vulnerabilities responsibly
  • Don't test security without authorization

5.6 Rate Limits and Fair Use

Respect usage limits:

  • Stay within your account's rate limits
  • Don't abuse free tier or trial accounts
  • Contact us for custom limits if needed
  • Don't create multiple accounts to circumvent limits

6. REPORTING VIOLATIONS

6.1 How to Report

If you become aware of violations of this AUP:

Email: abuse@megallm.io

Subject: "AUP Violation Report"

Include:

  • Description of the violation
  • Evidence (screenshots, URLs, API logs if available)
  • Account or user information (if known)
  • Date and time of observed violation

6.2 We Investigate All Reports

We take all reports seriously and will:

  • Investigate reported violations promptly
  • Take appropriate action against violating accounts
  • Notify law enforcement if illegal activity is detected
  • Protect reporter confidentiality to the extent possible

6.3 False Reports

Making false or malicious reports is itself a violation of this AUP and may result in account termination.

6.4 Whistleblower Protection

We will not retaliate against users who report violations in good faith, even if the report involves their own account or employer.

7. ENFORCEMENT

7.1 Violation Response

When we detect or receive reports of AUP violations, we may:

A. Issue a Warning

  • For minor or first-time violations
  • Require corrective action within specified timeframe
  • Monitor account for compliance

B. Temporarily Suspend Account

  • For serious or repeated violations
  • While investigating alleged violations
  • To prevent ongoing harm

C. Permanently Terminate Account

  • For severe violations (illegal activity, CSAM, terrorism, etc.)
  • For repeated violations after warnings
  • For violations that cause significant harm
  • For circumventing prior enforcement actions

D. Report to Authorities

  • For illegal activity (required or appropriate)
  • For child exploitation or endangerment
  • For threats of violence
  • For terrorism or extremist content

7.2 Enforcement Factors

We consider the following when determining appropriate enforcement:

  • Severity of the violation
  • Whether violation was intentional or negligent
  • Harm caused or potential harm
  • User's violation history
  • User's cooperation in resolving the issue
  • Whether violation is ongoing or remediated

7.3 Appeals Process

If you believe enforcement action was taken in error:

Email: appeals@megallm.io

Subject: "AUP Enforcement Appeal"

Include:

  • Your account information
  • Description of enforcement action
  • Explanation of why you believe it was in error
  • Evidence supporting your appeal

We will review appeals within 10 business days and respond with our decision.

7.4 No Refunds for Violations

If your account is terminated for violating this AUP:

  • You forfeit all unused credits
  • No refunds will be provided
  • You remain liable for all charges incurred

8. MONITORING AND DETECTION

8.1 Automated Monitoring

We use automated systems to detect potential violations:

  • Pattern analysis to identify abusive usage
  • Content filtering to flag prohibited content
  • Anomaly detection for unusual activity
  • Rate limit enforcement

8.2 Human Review

Automated flagging is followed by human review:

  • We don't take action based solely on automated systems for serious violations
  • Trained reviewers assess flagged content
  • Context is considered in enforcement decisions

8.3 User Reports

We rely on the community to report violations:

  • Users can report violations via abuse@megallm.io
  • We investigate all good faith reports
  • Reporter identity is protected

8.4 Model Provider Reports

Model Providers may flag violations:

  • Model Providers may report violations of their policies
  • We cooperate with Model Provider enforcement efforts
  • Violations of Model Provider terms may result in loss of access to those models

8.5 Privacy in Monitoring

Our monitoring respects your privacy:

  • We do NOT log your API prompts or completions by default
  • Monitoring focuses on metadata and usage patterns
  • We only access content when investigating reported violations
  • All monitoring complies with our Privacy Policy

9. CONSEQUENCES OF VIOLATIONS

9.1 Account Suspension

Suspended accounts:

  • Cannot access the Service or API
  • Cannot create new API keys
  • Retain data during suspension period
  • May appeal suspension

9.2 Account Termination

Terminated accounts:

  • Permanent loss of access to the Service
  • Forfeiture of unused credits (for violations)
  • Deletion of account data per our Privacy Policy
  • Possible reporting to authorities (for illegal activity)

9.3 Legal Consequences

Violations may result in:

  • Legal action by MegaLLM to enforce these terms
  • Legal action by third parties harmed by violations
  • Criminal prosecution for illegal activities
  • Civil liability for damages caused

9.4 Downstream Impact

If you build applications using MegaLLM:

  • Your application may lose API access if you violate this AUP
  • Your end users may be affected by enforcement actions
  • You are responsible for ensuring your users comply with this AUP

10. MODEL PROVIDER POLICIES

10.1 Incorporation by Reference

Model Provider acceptable use policies are incorporated into this AUP by reference:

10.2 Direct Enforcement

Model Providers may independently enforce their policies:

  • You may lose access to specific models (not your entire MegaLLM account)
  • Model Providers may require us to suspend your access
  • Model Provider enforcement is beyond our control

10.3 Updates to Provider Policies

Model Provider policies may change:

  • Check provider documentation regularly
  • We are not responsible for notifying you of provider policy changes
  • You are responsible for ongoing compliance

11. CHANGES TO THIS POLICY

11.1 Right to Modify

We may update this AUP at any time to:

  • Address new abuse patterns
  • Comply with legal requirements
  • Align with Model Provider policy changes
  • Clarify ambiguous provisions

11.2 Notification

For material changes:

  • We will update the "Last Updated" date
  • We will notify you via email at least 30 days in advance
  • We will post a notice on our website

11.3 Continued Use

Your continued use of the Service after changes take effect constitutes acceptance of the updated AUP.

If you do not agree with changes, you must stop using the Service and may terminate your account.

12. QUESTIONS AND CLARIFICATIONS

12.1 Unsure if Your Use Case is Permitted?

If you're uncertain whether your intended use complies with this AUP:

Email: compliance@megallm.io

Subject: "Use Case Review Request"

Include:

  • Detailed description of your intended use
  • Technical implementation details
  • Safeguards you plan to implement
  • Any relevant regulatory or legal considerations

We will review and provide guidance within 5 business days.

12.2 Requesting Exceptions

In rare cases, we may grant exceptions to certain provisions of this AUP:

  • Must be requested in advance (no retroactive exceptions)
  • Require business justification
  • May require additional safeguards or monitoring
  • Subject to approval by MegaLLM legal and compliance team
  • Not available for prohibited illegal activities

Email: legal@megallm.io

Subject: "AUP Exception Request"

13. CONTACT US

13.1 AUP Questions

For questions about this Acceptable Use Policy:

Email: compliance@megallm.io

Subject: "AUP Question"

13.2 Report Violations

To report violations of this AUP:

Email: abuse@megallm.io

Subject: "AUP Violation Report"

13.3 Appeal Enforcement Actions

To appeal suspension or termination:

Email: appeals@megallm.io

Subject: "AUP Enforcement Appeal"

13.4 Security Issues

To report security vulnerabilities:

Email: security@megallm.io

Subject: "Security Vulnerability"

SUMMARY OF KEY POINTS

✅ YOU MAY USE MEGALLM FOR:

  • • Application development and business operations
  • • Creative work and content generation
  • • Education, learning, and research
  • • Personal productivity and exploration

❌ YOU MAY NOT USE MEGALLM FOR:

  • • Illegal activities or facilitating crimes
  • • Harming, exploiting, or endangering children
  • • Generating hateful, violent, or discriminatory content
  • • Privacy violations, stalking, or unauthorized surveillance
  • • Spam, fraud, or deceptive practices
  • • Platform abuse or circumventing restrictions
  • • High-risk applications without appropriate safeguards
  • • Violating Model Provider policies

⚖️ ENFORCEMENT:

  • • Violations may result in warnings, suspension, or termination
  • • Severe violations may be reported to law enforcement
  • • No refunds for termination due to violations
  • • Appeals process available

📧 REPORTING & QUESTIONS:

Last Updated: November 27, 2025

Effective Date: November 27, 2025

Version: 1.0

© 2024-2025 Ghostlytics Payments Private Limited. All rights reserved.