Acceptable Use Policy

Last updated: October 2025

Acceptable Use

Permitted Use

  • Personal Generation: Creation of images for personal use

  • Commercial: Commercial use of generated images

  • Educational: Educational and research purposes

  • Artistic: Artistic and creative expression

Good Practices

  • Respect: Respectful treatment of everyone

  • Legality: Use within the law

  • Ethics: Ethical and responsible behavior

  • Collaboration: Positive contribution to the community

Prohibited Content

Abusive Content

  • Hate: Content that incites hatred, discrimination, or denigration

  • Harassment: Persecution or intimidation

  • Violence: Violent or graphic content

  • Threats: Threats to individuals or groups

Inappropriate Content

  • Sexual: Explicit or inappropriate sexual content

  • Illegal: Content that violates applicable laws

  • Fraudulent: Misleading or fraudulent content

  • Dangerous: Content that causes harm or risk

Offensive Content

  • Discrimination: Based on race, gender, religion

  • Bullying: Intimidation or humiliation

  • Spam: Repetitive or unwanted content

  • Invasive: Violation of third-party privacy

Inappropriate Behavior

Inappropriate Technical Use

  • Reverse Engineering: Attempt to bypass the system

  • Unauthorized Access: Attempts to circumvent security

  • System Abuse: Automated use

  • Exploitation: Exploitation of vulnerabilities

Inappropriate Social Behavior

  • Trolling: Intentional disruptive behavior

  • Spam: Sending repetitive content

  • Fraud: Attempts to deceive the system

  • Manipulation: Manipulation of results or metrics

Rights Violation

  • Intellectual Property: Infringing third-party rights

  • Privacy: Violating other users' privacy

  • Confidentiality: Disclosing confidential information

  • Security: Compromising platform security

Violations

Types of Violation

  • Minor: First offense or lesser severity

  • Moderate: Repeated violation or greater impact

  • Severe: Serious violation or multiple offenses

  • Critical: Violation that compromises security

Examples of Violations

  • Minor: Improper use of prompts

  • Moderate: Generation of offensive content

  • Severe: Attempt to bypass payment system

  • Critical: Attack on platform security

Violation Detection

  • Automatic: Automatic detection systems

  • Manual: Review by human team

  • Reporting: Reports from other users

  • Audit: Analysis of logs and activity

Consequences

Corrective Measures

  • Warning: Notification of the violation

  • Education: Guidance on proper use

  • Limitation: Restriction of features

  • Suspension: Temporary account suspension

Disciplinary Measures

  • Reprimand: Formal warning about behavior

  • Suspension: Temporary blocking of access

  • Restriction: Limitation of functionalities

  • Termination: Permanent account termination

  • Notification: Communication to authorities

  • Preservation: Maintenance of evidence

  • Cooperation: Collaboration with investigations

  • Legal Action: Legal proceedings when necessary

Reports

How to Report

  • Form: Report form on the platform

  • Chat: Live support when available

  • Anonymous: Anonymous reports accepted

Required Information

  • Description: Details of the violation

  • Evidence: Screenshots and blockchain transactions

  • Context: Circumstances of the situation

  • Witnesses: Other people involved

Reporting Process

  • Receipt: Acknowledgment of the report

  • Investigation: Analysis of the facts

  • Decision: Determination of measures

  • Communication: Response to the reporter

Enforcement

Enforcement Principles

  • Proportionality: Measures appropriate to the violation

  • Justice: Fair and impartial treatment

  • Transparency: Clear and communicated process

  • Consistency: Uniform application of the rules

Enforcement Process

  • Investigation: Detailed analysis of the facts

  • Decision: Determination based on evidence

  • Appeal: Possibility of contestation

Review and Learning

  • Monitoring: Follow-up of results

  • Adjustments: Improvement of policies

  • Communication: Transparency with users

Last updated