SILVERILE ACCEPTABLE USE POLICY

Effective Date: January 2, 2026

1. INTRODUCTION & SCOPE

This Acceptable Use Policy ("Policy") is incorporated into the Silverile Customer Agreement ("Master Agreement") available at silverile.com/legal/customer-agreement and applies to all use of Silverile's Products and Services.

"You" or "Customer" refers to any individual or organization using Silverile Products. "Products" refers to all Silverile Cloud Products, StoryCraft-AI, APIs, and related services.

By accessing or using the Products, you agree to comply with this Policy. Violation of this Policy may result in suspension or termination of your Account without refund or liability.

This Policy applies to:

  • (a) Account Owners and Administrators;
  • (b) Secondary Users and team members;
  • (c) Third-party integrations and connected applications;
  • (d) API calls and automated access;
  • (e) Content (projects, tasks, files, messages, comments) uploaded to the Products.

2. PROHIBITED ACTIVITIES & CONDUCT

You shall NOT, and shall ensure Secondary Users do not:

2.1 Illegal Activity

  • (a) Use the Products for any illegal purpose or in violation of any applicable law, regulation, statute, or ordinance;
  • (b) Engage in, promote, or facilitate illegal activity (drug trafficking, money laundering, terrorism, human trafficking, etc.);
  • (c) Violate sanctions laws or trade embargoes (OFAC, EU sanctions, UN sanctions, etc.);
  • (d) Use the Products on behalf of sanctioned individuals, entities, or countries;
  • (e) Violate export control regulations (EAR, ITAR) by exporting controlled technology to prohibited countries;
  • (f) Evade taxes or engage in tax fraud.

2.2 Malware & Harmful Code

  • (a) Upload, transmit, execute, or distribute malware, viruses, worms, Trojans, ransomware, or other malicious code;
  • (b) Upload files containing hidden code designed to disrupt, disable, or impair functionality;
  • (c) Distribute code containing spyware, adware, or keystroke loggers;
  • (d) Upload files with the intent to compromise the security or performance of the Products or other users' data;
  • (e) Create or distribute infected files or code;
  • (f) Knowingly distribute code that violates third-party IP rights.

2.3 Security Attacks & Unauthorized Access

  • (a) Attempt unauthorized access to the Products, servers, databases, or networks;
  • (b) Perform penetration testing, vulnerability assessment, or security research without written permission from Silverile's Chief Security Officer;
  • (c) Exploit security vulnerabilities or zero-day flaws;
  • (d) Circumvent authentication, authorization, or encryption mechanisms;
  • (e) Attempt brute-force attacks on passwords or credentials;
  • (f) Use techniques to bypass firewalls, intrusion detection, or other security controls;
  • (g) Launch Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks;
  • (h) Intercept, monitor, or modify data transmission without authorization;
  • (i) Impersonate Silverile staff or systems.

2.4 Reverse Engineering & Decompilation

  • (a) Decompile, disassemble, or reverse-engineer the Products or any Silverile software;
  • (b) Extract source code, algorithms, or technical designs;
  • (c) Attempt to discover the underlying technology, architecture, or methodologies;
  • (d) Extract or use StoryCraft-AI models or training data;
  • (e) Remove or modify copyright, patent, or proprietary notices;
  • (f) Use the Products to understand Silverile's internal systems or infrastructure.

2.5 Scraping & Automated Access

  • (a) Scrape, crawl, or programmatically access the Products without written authorization;
  • (b) Use bots, spiders, or automated tools to download or copy content;
  • (c) Bypass rate limits or usage restrictions through automated means;
  • (d) Mirror or replicate the Products or Content;
  • (e) Access the Products via unauthorized API access patterns;
  • (f) Use the Products to build competing products or services.

Exception: Authorized API access per API Terms is permitted.

2.6 Intellectual Property Infringement

  • (a) Infringe, misappropriate, or violate any third-party patent, copyright, trademark, trade secret, or other IP right;
  • (b) Upload content that you do not own or have the right to use;
  • (c) Use content without proper attribution or licensing;
  • (d) Create counterfeit materials or infringing copies;
  • (e) Violate open-source licenses (GPL, MIT, Apache, etc.) when using open-source software;
  • (f) Claim ownership of or copyright to third-party content.

2.7 Harmful Content – Illegal & Dangerous

  • (a) Child Exploitation: Upload, distribute, or access child sexual abuse material (CSAM) or content depicting minors in sexual situations;
  • (b) Illegal Drugs: Provide instructions or facilitate the manufacture, distribution, or use of illegal drugs;
  • (c) Weapons & Violence: Upload instructions for creating explosives, weapons, or devices designed to cause harm;
  • (d) Terrorism & Extremism: Promote terrorism, violent extremism, or recruitment into extremist organizations;
  • (e) Self-Harm: Promote, encourage, or provide instructions for self-harm, suicide, or eating disorders;
  • (f) Human Trafficking: Facilitate human trafficking, sexual slavery, or forced labor;
  • (g) Illegal Services: Facilitate prostitution, gambling, illegal gambling, or other illegal services.

2.8 Harmful Content – Abusive & Discriminatory

  • (a) Harassment: Target, harass, bully, threaten, intimidate, or stalk individuals or groups;
  • (b) Hate Speech: Promote hatred, violence, or discrimination based on:
    • Race, ethnicity, or national origin
    • Religion or belief
    • Gender identity or expression
    • Sexual orientation
    • Disability or mental health condition
    • Caste or social status
    • Immigration status
  • (c) Defamation: Make false, defamatory, or libelous statements about individuals or organizations;
  • (d) Incitement: Incite or encourage violence, illegal activity, discrimination, or self-harm;
  • (e) Doxing: Share personal information (home address, phone, email, identifying photos) with intent to harass or harm.

2.9 Deception & Fraud

  • (a) Impersonation: Misrepresent your identity, impersonate others (individuals, companies, authorities), or falsify authorization;
  • (b) Phishing: Send phishing emails, texts, or messages designed to deceive and steal credentials;
  • (c) Social Engineering: Manipulate individuals to disclose sensitive information;
  • (d) Fraud: Engage in fraud, scams, or schemes to deceive others;
  • (e) False Information: Intentionally distribute false, misleading, or deceptive information;
  • (f) Credential Theft: Steal, share, or sell login credentials or authentication tokens.

2.10 Competitive Benchmarking & Misuse

  • (a) Use the Products to benchmark, test, or analyze Silverile's performance against competing products;
  • (b) Publicly disclose performance data, test results, or metrics without Silverile's consent;
  • (c) Use the Products primarily to evaluate technology for competitive advantage;
  • (d) Share competitive analysis or performance data with competitors;
  • (e) Use the Products to develop substitute or competitive products.

Exception: Internal evaluation for purchase decisions is permitted.

2.11 Excessive Resource Usage

  • (a) Consume disproportionate computational resources, storage, or bandwidth;
  • (b) Upload files larger than tier limits or documented maximums;
  • (c) Make excessive API requests that impact service performance for other customers;
  • (d) Run scripts, processes, or computations that consume >80% of server resources;
  • (e) Deliberately consume resources to trigger billing overages;
  • (f) Use the Products for cryptocurrency mining or high-compute workloads.

2.12 Spam & Unsolicited Communications

  • (a) Send unsolicited bulk emails, SMS, or push notifications using the Products;
  • (b) Use the Products for spam, phishing, or scam campaigns;
  • (c) Generate or automate spam messages, comments, or notifications;
  • (d) Send messages that harass, threaten, or defame recipients;
  • (e) Use forwarding or relay services to send spam.

2.13 Data Harvesting & Privacy Violations

  • (a) Collect or aggregate personal data without consent for purposes unrelated to the Products;
  • (b) Harvest email addresses, phone numbers, or contact information for external use;
  • (c) Build databases or lists from user information extracted from the Products;
  • (d) Sell or trade personal data extracted from the Products;
  • (e) Violate third-party privacy policies or terms of service.

2.14 Circumventing Restrictions

  • (a) Attempt to bypass licensing restrictions, usage limits, or access controls;
  • (b) Create multiple accounts to circumvent tier limits or usage thresholds;
  • (c) Share a single account across multiple users to avoid purchasing additional licenses;
  • (d) Use VPNs, proxies, or other tools to evade geographic restrictions or IP blocks;
  • (e) Modify account settings to manipulate billing or access.

2.15 Abuse of Silverile Services

  • (a) Overwhelm customer support with frivolous, repetitive, or abusive inquiries;
  • (b) Threaten, harass, or attack Silverile employees or support staff;
  • (c) Attempt to manipulate Silverile employees into bypassing policies or controls;
  • (d) File false DMCA complaints or legal threats;
  • (e) Abuse feedback mechanisms to spam or harass.

3. STORYCRAFTAI-SPECIFIC RESTRICTIONS

In addition to Section 2, the following restrictions apply specifically to StoryCraft-AI:

3.1 Prohibited Input & Output

You shall not use StoryCraft-AI to generate:

  • (a) Illegal Content: Instructions for illegal drugs, explosives, weapons, or illegal services;
  • (b) CSAM: Content sexualizing, exploiting, or endangering minors;
  • (c) Malicious Code: Code designed to hack, infect, or damage systems;
  • (d) Phishing: Phishing emails, scam messages, or deceptive content;
  • (e) Impersonation: Content impersonating others or falsifying authorization;
  • (f) Misinformation: Intentionally false information designed to mislead;
  • (g) Harassment: Content targeting, harassing, threatening, or defaming individuals;
  • (h) Discrimination: Content promoting discrimination or hate speech;
  • (i) Adult Content: Sexually explicit or pornographic content;
  • (j) Deepfakes: Synthetic media designed to deceive (fake videos, voice, images).

3.2 Competitive Use Restrictions

  • (a) You may not use StoryCraft-AI Output to train competing AI models;
  • (b) You may not publicly claim that StoryCraft-AI Output was generated by humans or your own team without disclosure;
  • (c) You may not reverse-engineer or extract the StoryCraft-AI model;
  • (d) You may not reproduce StoryCraft-AI's exact functionality for competitive purposes.

3.3 Output Accuracy Responsibility

You acknowledge that:

  • (a) StoryCraft-AI Output may be inaccurate, incomplete, or biased;
  • (b) You must review all Output before reliance or publication;
  • (c) You are solely responsible for validating Output accuracy and appropriateness;
  • (d) Silverile is not liable for errors or harm from Output reliance.

4. MONITORING & ENFORCEMENT

4.1 Monitoring Activities

Silverile monitors for violations of this Policy through:

  • (a) Automated Detection: Automated systems scan for malware, phishing, and spam patterns;
  • (b) Content Flagging: Automated flagging of illegal content (CSAM, terrorism, etc.);
  • (c) Usage Analytics: Analysis of account activity patterns for suspicious behavior;
  • (d) Third-Party Reports: User reports of violations;
  • (e) Security Research: Penetration testing and security assessments;
  • (f) Log Analysis: Review of server logs for unauthorized access attempts.

4.2 Investigation Process

Upon discovery of a suspected violation:

  • (a) Silverile investigates the violation (typically within 5-10 business days);
  • (b) Evidence is collected and reviewed;
  • (c) Customer is notified of the violation and given opportunity to respond (within 5-10 business days);
  • (d) Investigation findings are documented;
  • (e) Enforcement action is determined (warning, suspension, or termination).

4.3 Cooperation with Law Enforcement

If a violation involves illegal activity, Silverile may:

  • (a) Preserve evidence for law enforcement;
  • (b) Report the violation to appropriate authorities (FBI, NCMEC, local law enforcement);
  • (c) Provide customer data to law enforcement pursuant to legal process;
  • (d) Cooperate with government investigations.

5. SUSPENSION & TERMINATION

5.1 Immediate Suspension

Silverile may immediately suspend Account access without prior notice if:

  • (a) Critical Threat: The violation poses imminent danger to users or systems (malware, DDoS, security intrusion);
  • (b) Illegal Activity: The violation involves illegal content (CSAM, terrorism, trafficking);
  • (c) Severe Repeated Violation: Customer has repeatedly violated this Policy despite warnings;
  • (d) Law Enforcement Request: Law enforcement or government request requires account suspension.

Suspension is temporary pending investigation. Account access is restored if investigation clears Customer, or Account is terminated if violation is confirmed.

5.2 Termination

Silverile may terminate this Agreement and permanently delete the Account if:

  • (a) Serious Violation: Violation of Sections 2.1, 2.2, 2.3, 2.7, 2.8, or 2.9 is confirmed;
  • (b) Repeated Violations: Customer repeatedly violates this Policy despite warnings and suspension;
  • (c) Non-Compliance: Customer fails to cure a material violation within 30 days of notice;
  • (d) Abuse of Process: Customer abuses the appeal or complaint process.

Notice: Silverile will provide written notice of termination including the violation, findings, and appeal options.

5.3 Account Data Upon Termination

Upon termination for violation of this Policy:

  • (a) Data Deletion: Customer's Account data is deleted within 30 days (no recovery);
  • (b) No Refund: Prepaid Fees are forfeited (no refund);
  • (c) Violation Evidence: Silverile may retain evidence of the violation for legal and law enforcement purposes.

6. REMEDIES & REMEDIATION

6.1 Remediation Options

If a violation is detected, Customer may be offered the opportunity to:

  • (a) Remove Content: Delete or remove violating content;
  • (b) Disable Feature: Disable problematic integrations or features;
  • (c) Implement Controls: Implement additional security or monitoring controls;
  • (d) Training: Complete security or compliance training;
  • (e) Attestation: Provide written attestation of future compliance.

Remediation must be completed within the timeframe specified by Silverile (typically 5-10 business days).

6.2 Cure Period

For non-critical violations, Customer may have 5-10 business days to cure the violation. Failure to cure within the specified timeframe may result in suspension or termination.

6.3 Silverile's Remedies

In addition to suspension or termination, Silverile may:

  • (a) Remove Content: Remove or quarantine violating content;
  • (b) Restrict Features: Restrict access to specific features or functionality;
  • (c) Downgrade Tier: Downgrade Account to a lower tier pending compliance;
  • (d) Legal Action: Pursue civil or criminal legal action;
  • (e) Report to Authorities: Report violation to relevant authorities.

7. EXCEPTIONS & LEGITIMATE USE

7.1 Security Research Exception

Silverile permits authorized security research (penetration testing, vulnerability assessment) conducted by:

  • (a) Professional security researchers;
  • (b) Authorized third-party security firms;
  • (c) Silverile employees and contractors.

Authorization: Contact security@silverile.com with:

  • Description of research scope
  • Researcher credentials and company affiliation
  • Timeline for testing
  • Testing methods and systems to be tested

Silverile will respond within 5 business days with authorization or denial.

7.2 Legitimate API & Integration Use

Authorized API access and integrations are permitted for:

  • (a) Legitimate business purposes;
  • (b) Integration with authorized third-party tools (GitHub, Slack, etc.);
  • (c) Custom applications and workflows.

Legitimate API use is governed by the API Terms, not this Policy (except for abuse of API).

7.3 Competitive Evaluation Exception

Internal evaluation of the Products for purchase decisions is permitted:

  • (a) Benchmarking for internal decision-making only (not public disclosure);
  • (b) Comparison with competing products for procurement purposes;
  • (c) Trial usage to evaluate fit for your organization.

Public disclosure of competitive metrics requires Silverile's permission.

8. CONTACT & APPEAL PROCESS

8.1 Violation Report

If you witness a violation of this Policy, report it to:

Email: abuse@silverile.com
Web Form: silverile.com/report-violation

Report details:

  • Account or user being reported
  • Specific violation(s)
  • Evidence (links, screenshots, timestamps)
  • Your name and contact information (optional but helpful)

8.2 Account Status Notifications

If your Account is suspended or terminated, Silverile will notify you via email to your registered address, including:

  • (a) Specific violation(s);
  • (b) Evidence or findings;
  • (c) Suspension/termination effective date;
  • (d) Appeal process and deadline;
  • (e) Data retention and deletion timeline.

8.3 Appeal Process

If your Account is suspended or terminated, you may appeal within 15 days by:

Email: legal@silverile.com with subject line "APPEAL: [Account Name]"

Appeal should include:

  • (a) Your Account name and email;
  • (b) The violation you are appealing;
  • (c) Explanation of why you believe the determination is incorrect;
  • (d) Any new evidence or context;
  • (e) Proposed remediation or corrective action.

Silverile will review the appeal and respond within 10 business days with a final determination.

8.4 Appeals Process Details

  • (a) Independence: Appeals are reviewed by a team independent of the original investigation team.
  • (b) Final Decision: Appeal decision is final; no further appeal is permitted.
  • (c) Data Retention: If appeal is successful, suspended Account is restored; if appeal is denied, termination stands.
  • (d) Communication: Silverile will communicate final determination via email.

9. EFFECTIVE DATES & CHANGES

9.1 Effective Date

This Policy is effective as of January 2, 2026, and supersedes all previous Acceptable Use Policies.

9.2 Amendments

Silverile may amend this Policy at any time with 30 days' written notice via email or posting at silverile.com/legal/acceptable-use-policy.

Continued use of the Products after the effective date constitutes acceptance of the amended Policy.

9.3 Archive & Version History

Previous versions of this Policy are archived at silverile.com/legal/archives with effective dates.

CONTACT INFORMATION

Silverile Inc.
1941 W Blaylock Dr
Phoenix, AZ 85085
USA

Violation Reports:
Email: abuse@silverile.com

Appeals & Questions:
Email: legal@silverile.com

Security Research Authorization:
Email: security@silverile.com

Support:
silverile.com

By using the Products, you agree to comply with this Policy.

Last Updated: January 2, 2026