RevOps AI, Inc. Acceptable Use Policy
Effective Date: July 29, 2025
Introduction and Incorporation by Reference: This Acceptable Use Policy (“AUP”) describes rules governing access to and use of RevOps AI, Inc.’s websites, platform, and services (the “Services”). It is incorporated into and forms part of the RevOps AI Terms of Service (“Terms”). Capitalized terms not defined here have the meanings given in the Terms. If you do not agree to this AUP, you must not use the Services.
1. Purpose and Scope
1.1 Purpose: The AUP protects the security, integrity, reliability, and lawful use of the Services, our users, and the communications ecosystem (including carriers and providers).
1.2 Scope: This AUP applies to all users, accounts, subaccounts, Agencies/whitelabel deployments (see Terms §4.10), and to all content, traffic, and integrations that touch the Services, including API calls and third-party connectors.
2. Your Responsibilities
2.1 Compliance: You must comply with this AUP, the Terms, our Privacy Policy, applicable laws and regulations (including data protection, communications, export/sanctions, consumer protection, and intellectual property laws), and all provider/carrier codes and registration requirements.
2.2 Accuracy and Authorization: You must use accurate identities and have authority for any activity you perform, including acting on behalf of Clients (if you are an Agency).
2.3 Security: You must implement appropriate safeguards for your credentials, accounts, API keys, and any data you handle via the Services; promptly notify us of suspected compromise; and follow reasonable security practices (e.g., strong secrets, least privilege, removal of stale credentials).
2.4 Records: Where consent or disclosures are required (e.g., for messaging or recording), you must maintain verifiable records (time/date, source, disclosure text, method) and furnish them within 5 business days upon request by us, a provider/carrier, or a regulator.
2.5 Telecom Independence & Allocation of Responsibility: RevOps AI is not a telecommunications carrier or common carrier and does not originate, route, transmit, or terminate PSTN or carrier traffic. You must use your own provider accounts (e.g., Twilio, MessageBird, Bandwidth) for telecom services under your direct contracts with such providers. You (and your chosen providers) are solely responsible for all telecom compliance and operations, including campaign/sender registration (e.g., A2P 10DLC, toll-free verification, short code approvals), KYC/brand vetting, sender ID provisioning, use-case approvals, content reviews, throughput/rate limits, deliverability, routing, fees/surcharges, and carrier interactions.
2.6 Provider/Carrier Policies & Guidance: You must comply with all applicable provider/carrier policies and codes of conduct. Any configuration assistance or guidance we provide is informational only, not legal advice, and does not constitute a commitment or guarantee of approval, compliance, or deliverability. We do not control (and are not liable for) carrier blocking, filtering, reputation scores, line-type detection, or delivery outcomes.
3. Prohibited Content
You may not upload, generate, transmit, or facilitate content via the Services that:
3.1 Is illegal or promotes illegal activity, including content that violates consumer protection, privacy, financial services, gambling, or securities laws.
3.2 Infringes or misappropriates intellectual property or publicity/privacy rights; facilitates counterfeit goods or unauthorized sharing of copyrighted works.
3.3 Sexualizes minors, depicts child sexual abuse material (CSAM), solicits or shares exploitative content, or endangers children in any way.
3.4 Promotes or threatens violence, terrorism, or self-harm; incites hatred or harassment of protected classes; doxxes individuals; or includes credible threats.
3.5 Facilitates fraud, scams, phishing, impersonation, identity deception, or social-engineering (including deepfake/voice-clone misuse without clear, contemporaneous disclosure and consent).
3.6 Distributes malware, spyware, bots designed to compromise systems, cryptomining without consent, or instructions for exploiting security vulnerabilities.
3.7 Promotes unlawful sale/distribution of controlled substances or paraphernalia; illegal firearms/explosives; or violates applicable restrictions on tobacco, alcohol, cannabis/THC/CBD, or pharmaceuticals.
3.8 Violates carrier content rules (including prohibited SHAFT categories where applicable) or misrepresents the nature/purpose of a campaign.
3.9 Is deceptive or unfair, including false endorsements, undisclosed native advertising, or claims that cannot be substantiated (e.g., financial, health, or legal outcomes).
3.10 Attempts to re-identify de-identified data, collect sensitive data without lawful basis, or process special category data in violation of law or the Terms.
4. Communications and Outreach Rules (Email, SMS/MMS, Voice, Messaging)
4.1 Lawful Basis & Consent: You are the sender and responsible for obtaining and documenting valid, prior consent for each recipient where required (e.g., TCPA, CAN-SPAM, GDPR/ePrivacy/PECR, CASL). Do not message purchased, rented, scraped, or third-party lists.
4.2 Identification & Disclosures: All messages must clearly identify the sender/brand and include required disclosures and opt-out instructions (e.g., “Text STOP to opt out, HELP for help”).
4.3 Opt-Outs & Suppression: Honor standard keywords (STOP, CANCEL, END, QUIT, UNSUBSCRIBE) and clear free-text opt-outs. Apply opt-outs to a global suppression list across all senders/workspaces under your account without undue delay.
4.4 DNC & Quiet Hours: Scrub applicable Do-Not-Call lists and observe legally required or carrier-mandated quiet hours based on recipient local time.
4.5 Registration & Alignment: Complete required registrations/approvals with your providers (A2P 10DLC, toll-free verification, short code approvals, political/charitable use cases). Ensure traffic, templates, links, and domains match the declared use case and samples filed with your providers.
4.6 Prohibited Tactics: No snowshoeing (traffic spread to evade blocks), ID rotation to evade reputation controls, gateway hopping, URL shortener abuse, or evasion of filters. No spoofing or misrepresenting caller ID/sender identity where prohibited.
4.7 Categories Requiring Pre-Approval or Provider Prohibitions: Certain categories (e.g., cannabis/THC/CBD in the U.S., some sweepstakes, lead-gen of dubious provenance, high-risk financial products, SHAFT content, and political messaging) may be disallowed or require additional registration and disclosures. You are responsible for compliance and pre-approval where applicable.
4.8 Voice Recording & Monitoring: Obtain and document required consent for call recording/monitoring and provide pre-connect notice where two-party consent is required.
4.9 Emergency Services: The Services do not support emergency calling (e.g., 911/E112). Do not use the Services for emergency communications.
4.10 Telemarketing Restrictions: Unsolicited telemarketing, lead-generation outreach to non-consenting recipients, or autodialed/prerecorded marketing to mobile numbers without prior express written consent is prohibited. Outreach to purchased/rented/scraped lists is prohibited. You must be able to produce proof of consent upon request.
4.11 Provider Accounts & Numbers: Originate traffic only through provider accounts that you own/control under your contracts. You are responsible for number pooling/aging, reputation management, and ensuring opt-outs persist across all numbers/senders under your account. Shared numbers or sender IDs must not be misused.
4.12 Provider/Carrier Fees & Fines: You are responsible for all provider/carrier fees, surcharges, pass-through fines, brand/campaign fees, and remediation costs assessed by providers/carriers. RevOps AI does not absorb such charges and is not responsible for recovering them.
5. Security, Network, and Platform Abuse
5.1 System Abuse: Do not probe, scan, or test the vulnerability of the Services or related networks without explicit written authorization; do not bypass or attempt to bypass security or rate limits.
5.2 Interference: Do not overload, flood, or disrupt the Services (e.g., DoS, resource exhaustion), nor intentionally interfere with other users’ use.
5.3 Unauthorized Monitoring: Do not intercept, monitor, or access communications or data without proper authorization and lawful basis.
5.4 Data Handling: Do not store or transmit regulated sensitive data (e.g., PHI, full payment card data) through the Services unless expressly permitted in a separate written agreement with us.
5.5 Credentials & API Keys: Do not share credentials; rotate secrets regularly; do not embed secrets in public repositories or client-side code.
6. API, Automation, and Integrations
6.1 Fair Use & Rate Limits: Respect documented rate limits, concurrency, and fair-use parameters; do not attempt to circumvent technical controls.
6.2 Scraping and Automated Collection: Do not scrape the Services, circumvent robots.txt, or bulk-harvest data except through documented APIs and within granted scopes.
6.3 Attribution and Branding: On free/trial tiers you must retain any “Powered by RevOps.ai” attribution (see Terms §2.2). Do not misrepresent the origin of outputs.
6.4 Third-Party Connectors: You are responsible for permissions, scopes, and data exchanged with third-party services you connect; you must comply with those services’ terms.
7. AI and Synthetic Media Use
7.1 Responsible Use: Do not use AI outputs to deceive, defraud, or impersonate without clear disclosure and consent; do not fabricate professional advice (legal/medical/financial) or claim outputs are guaranteed accurate.
7.2 Sensitive Uses: Do not use AI features to generate or disseminate prohibited content (see Section 3), to target protected classes in a discriminatory manner, or to create biometric identifiers without explicit lawful basis and consent.
7.3 Model/Prompt Security: Do not attempt to extract hidden model parameters, proprietary prompts, or other users’ data; do not use the Services to train generalized models offered to others unless expressly permitted.
8. Restricted and High-Risk Use Cases
8.1 Safety-Critical: Do not use the Services in contexts where failure could lead to death or serious injury (e.g., medical devices, autonomous vehicles, aircraft navigation) without our prior written approval.
8.2 Financial Transactions: The Services are not a payment processor. Do not collect or store full payment card data in violation of PCI rules.
8.3 Sanctions and Export: Do not use or provide access to the Services in violation of export control or economic sanctions laws (e.g., to embargoed destinations, restricted parties, or for prohibited end-uses).
9. Privacy and Data Protection
9.1 Lawful Processing: Collect, use, and share personal data only with a lawful basis and in accordance with our Privacy Policy and applicable laws.
9.2 Minimization: Limit personal data collected to what is necessary for your stated purpose; avoid collecting special category/sensitive data unless lawful and necessary.
9.3 Children: The Services are not intended for children under 18; do not target or profile minors or process their data via the Services.
10. Enforcement
10.1 Monitoring: We may (but are not obligated to) monitor or review activity for compliance and for safety, abuse prevention, and service integrity.
10.2 Remedial Actions: We may take actions we deem appropriate to address violations or risk signals, including warnings, throttling, filtering, content removal, number/sender blocking, compliance holds, feature limitations, suspension, or termination. We may temporarily disable specific provider connections or numbers if necessary to protect the ecosystem. You remain responsible for your provider/carrier obligations and charges.
10.3 Preservation and Disclosure: We may preserve and disclose information as required by law or to carriers/providers or regulators to address abuse, fraud, or legal process.
10.4 Audit and Cooperation: You must cooperate with our investigations and provide requested records (e.g., consent logs, template disclosures, campaign registrations) within requested timeframes.
10.5 Allocation of Risk: We are not liable for actions taken in good faith to protect the Services, our users, carriers/providers, or the public. Your fees may continue to accrue during suspension. Refunds are addressed by the Terms.
11. Reporting Abuse
Report suspected violations or security issues to abuse@revops.ai (abuse) or security@revops.ai (security). For legal notices, use legal@revops.ai as provided in the Terms.
12. Changes to this AUP
We may update this AUP from time to time. We will post changes and update the Effective Date. Material changes will be notified consistent with the Terms. Continued use after changes become effective constitutes acceptance.
13. Definitions (Summary)
“Agency” and “Client” have the meanings in the Terms. “Global Suppression List” means an organization-wide list preventing further messaging to opted-out recipients across all senders/numbers/channels. “A2P 10DLC” refers to U.S. Application-to-Person 10-digit long code messaging requiring registration. “Quiet Hours” are legally or carrier-mandated times when marketing/prerecorded content may not be delivered based on recipient local time.
Contact:
Questions about this AUP: RevOps AI, Inc., 2261 Market Street, STE 85248, San Francisco, CA 94114, USA. Email: legal@revops.ai / abuse@revops.ai / security@revops.ai.