1. Purpose
Preserve stability, security, fairness, and constructive experimentation within a shared prototype context.
2. Prohibited Technical Abuse
- Automated high-frequency requests degrading responsiveness
- Attempted exploitation, fuzzing, or vulnerability scanning without coordinated disclosure
- Circumventing feature flags, access controls, or navigation gating
- Injection of malicious payloads intending to exfiltrate or corrupt state
3. Content Restrictions
Do not input content that is unlawful, harassing, exploitative, hateful, or privacy-invasive. Avoid regulated personal, financial, health, or biometric data.
4. Integrity & Attribution
Maintain accurate identifiers; do not impersonate staff, systems, or other participants. Avoid misleading output mischaracterization.
5. Resource Fair Use
Refrain from tactics that monopolize compute (looped replays, synthetic concurrency spikes). Cooperative load sharing sustains demo quality.
6. Security Collaboration
Potential weaknesses: disclose privately (see forthcoming Security & Disclosure page). Public exploitation or proof-of-concept publication prior to remediation violates this policy.
7. Enforcement
Violations may trigger throttling, suspension, or removal. Severity, intent, recurrence, and systemic impact inform response.
8. Policy Evolution
Expect iteration as features mature and risk surfaces evolve. Significant amendments may be highlighted at index.
9. Contact
Report misuse: abuse@clearvoice.example.