Acceptable Use Policy
Last updated: March 11, 2026
This Acceptable Use Policy ("AUP") governs your use of the POM platform and all related products and services (collectively, the "Service"). This AUP is incorporated by reference into the POM Terms of Service ("ToS"), available at https://askpom.com/legal/terms. Capitalized terms not defined herein have the meanings ascribed to them in the ToS.
You agree to comply with this AUP in connection with your use of the Service. Violation of this AUP may result in suspension or termination of your access to the Service as described in Section 8 below.
1. Purpose and Scope
1.1 Purpose
This AUP establishes the rules and standards for acceptable use of the Service. It is designed to protect the integrity, security, and availability of the Service; to protect the rights and safety of POM, its Customers, and third parties; and to ensure compliance with applicable law and the terms of POM's upstream AI model providers.
1.2 Scope
This AUP applies to:
- All Customers, authorized users, and any individual or entity that accesses or uses the Service
- All POM products, including POM Desktop, POM CLI/Daemon, POM Mobile, POM Relay, POM Cloud, POM Protocol, and any associated APIs, SDKs, or tools
- All content submitted to, generated by, or transmitted through the Service, including Customer Data and Agent Outputs
- All AI agent sessions, actions, and outputs orchestrated through the Service
1.3 Relationship to ToS
This AUP is part of and subject to the ToS. In the event of a conflict between this AUP and the ToS, the ToS shall control unless this AUP expressly states otherwise.
2. General Prohibitions
You shall not use the Service to:
2.1 Illegal Activities
(a) Engage in, facilitate, promote, or further any activity that violates applicable local, state, national, or international law or regulation.
(b) Facilitate or promote illegal transactions, including the sale or distribution of controlled substances, illegal weapons, counterfeit goods, or stolen property.
2.2 Violation of Third-Party Rights
(a) Infringe, misappropriate, or violate any third party's intellectual property rights, including patents, copyrights, trademarks, trade secrets, or other proprietary rights.
(b) Violate any third party's rights of privacy, publicity, or data protection, or process third-party personal data in violation of applicable data protection law.
(c) Use the Service to engage in or facilitate identity theft, unauthorized collection of personal information, or unauthorized surveillance of individuals.
2.3 Unauthorized Access and Security Violations
(a) Access, tamper with, or use non-public areas of the Service, POM's systems, or POM's providers' systems without authorization.
(b) Probe, scan, or test the vulnerability of the Service or any connected system or network, or breach or circumvent any security or authentication measures, except as expressly authorized in writing by POM.
(c) Access or search the Service by any means other than POM's publicly supported interfaces (e.g., through scraping, crawling, or unauthorized API access), except as permitted under a separate written agreement.
(d) Forge headers, impersonate, or otherwise manipulate identifiers to disguise the origin of any communication transmitted through the Service.
2.4 Service Interference
(a) Interfere with, disrupt, or attempt to disrupt the integrity, performance, or availability of the Service or any connected system or network.
(b) Introduce malware, viruses, worms, Trojan horses, or other malicious code into the Service or any connected system.
(c) Conduct denial-of-service attacks or other actions designed to degrade or prevent access to the Service.
2.5 Reverse Engineering
(a) Reverse engineer, decompile, disassemble, or otherwise attempt to derive the source code, algorithms, or underlying structure of the Service or any POM proprietary software, except to the extent that such restriction is expressly prohibited by applicable law.
2.6 Competitive Use
(a) Use the Service, or any data or information obtained through the Service, to develop, improve, train, or operate a product or service that competes with POM or the Service.
(b) Benchmark or conduct performance testing of the Service for purposes of competitive analysis or publication without POM's prior written consent.
3. AI Agent-Specific Prohibitions
The Service enables orchestration of AI agents that perform tasks autonomously or semi-autonomously. The following prohibitions apply specifically to the use of AI agents through the Service. You shall not use AI agents orchestrated through the Service to:
3.1 Child Exploitation
(a) Generate, solicit, or distribute child sexual abuse material ("CSAM") or any content that sexually exploits or endangers minors.
(b) Facilitate grooming, trafficking, or any form of exploitation of minors.
3.2 Mass Surveillance and Tracking
(a) Conduct mass surveillance, bulk data collection, or systematic monitoring of individuals without lawful authority and appropriate legal process.
(b) Build or operate systems for tracking, profiling, or scoring individuals based on social behavior, political activity, religious practice, or other protected characteristics.
3.3 Weapons and Dangerous Materials
(a) Design, develop, produce, or assist in the creation of chemical, biological, radiological, nuclear, or other weapons of mass destruction.
(b) Generate instructions, formulations, or technical guidance for the creation of explosives, toxic substances, or other materials intended to cause physical harm.
3.4 Election Interference and Voter Manipulation
(a) Generate or distribute content designed to suppress voter turnout, mislead voters about voting procedures or eligibility, or otherwise interfere with democratic electoral processes.
(b) Conduct targeted political influence campaigns that impersonate candidates, officials, or election authorities, or that distribute fabricated endorsements or positions.
3.5 Disinformation at Scale
(a) Generate or distribute false or misleading content at scale with the intent to deceive the public, manipulate public opinion, or undermine trust in institutions.
(b) Operate networks of AI agents to simulate grassroots support, manufacture false consensus, or amplify disinformation campaigns (commonly known as "astroturfing").
3.6 Malicious Cyber Operations
(a) Develop, deploy, or distribute malware, ransomware, exploits, or other tools designed for unauthorized access to computer systems.
(b) Conduct phishing, spear-phishing, or credential harvesting campaigns.
(c) Exploit vulnerabilities in computer systems, networks, or applications for unauthorized purposes.
3.7 Circumvention of AI Safety Measures
(a) Attempt to bypass, circumvent, disable, or undermine the safety measures, content filters, usage policies, or other restrictions imposed by upstream AI model providers (including Anthropic, OpenAI, and Google).
(b) Craft prompts, instructions, or agent configurations specifically designed to elicit outputs that violate upstream provider usage policies (commonly known as "jailbreaking").
3.8 Automated Abuse
(a) Use agents for automated scraping of websites, platforms, or services in violation of those services' terms of use or applicable law.
(b) Generate or distribute unsolicited bulk communications (spam), including email, messaging, or social media spam.
(c) Conduct social engineering attacks, including pretextual communications designed to deceive individuals into revealing confidential information or performing actions against their interests.
3.9 Impersonation Without Disclosure
(a) Use agents to impersonate specific real individuals without their consent.
(b) Deploy agents in contexts where they interact with humans without clearly disclosing that the interaction involves an AI agent, where such disclosure is required by applicable law or reasonably expected by the interacting party.
3.10 Automated Decisions Without Human Oversight
(a) Use agents to make automated decisions that produce legal effects concerning individuals or similarly significantly affect individuals — including decisions relating to employment, credit, housing, insurance, education, or access to essential services — without meaningful human review and oversight of those decisions.
(b) Deploy agents as the sole decision-maker in processes that materially affect individual rights, benefits, or opportunities without providing affected individuals notice and an opportunity to contest the decision.
4. High-Risk Activity Prohibition
The Service is not designed, intended, or authorized for use in connection with any of the following high-risk activities. You shall not use the Service for:
4.1 Life-Critical Systems
(a) Operation, control, or monitoring of life support systems or medical devices where failure could result in death or serious bodily injury.
4.2 Emergency Services
(a) Operation or dispatch of emergency services, including 911 or equivalent emergency response systems.
4.3 Autonomous Vehicle Control
(a) Real-time control, navigation, or operational decision-making for autonomous or semi-autonomous vehicles.
4.4 Air Traffic Control
(a) Control, routing, or management of air traffic or flight operations.
4.5 Nuclear Facility Management
(a) Operation, control, or safety monitoring of nuclear facilities, including reactors, fuel processing, or waste management systems.
4.6 Medical Diagnosis and Treatment
(a) Rendering medical diagnoses, prescribing treatments, or making clinical decisions without the direct supervision and oversight of a duly licensed healthcare professional.
4.7 Automated Legal Judgments
(a) Rendering legal judgments, adjudications, or determinations that affect individual rights, liberties, or legal status without review and approval by a qualified legal professional.
4.8 Weapons Systems
(a) Design, targeting, deployment, or control of weapons systems or munitions, including autonomous weapons, targeting algorithms, or weapons guidance systems.
4.9 Automated Employment Decisions
(a) Making automated employment decisions — including hiring, firing, compensation, promotion, or disciplinary actions — without qualified human review and approval of each decision.
4.10 Critical Infrastructure Control
(a) Real-time control of critical infrastructure systems, including but not limited to power grids, water treatment facilities, telecommunications networks, or financial market trading systems, where an AI agent error could cause significant harm.
4.11 Other High-Risk Activities
(a) Any other application where the failure, malfunction, or inaccuracy of the Service could reasonably be expected to result in death, serious bodily injury, severe environmental damage, or significant property damage.
(b) The high-risk activity restrictions in this Section 4 are in addition to, and do not limit, any restrictions set forth in the Terms of Service.
5. Agent Autonomy Requirements
When using AI agents through the Service, you are responsible for implementing appropriate governance, oversight, and controls. Specifically:
5.1 Human Oversight
(a) You must configure and maintain appropriate levels of human oversight for all agent actions, commensurate with the risk and impact of those actions.
(b) You must ensure that qualified personnel are available to monitor, intervene in, and override agent actions when necessary.
5.2 Review Before Deployment
(a) You must review and approve agent outputs before deploying them to production environments, publishing them externally, or relying on them for consequential decisions.
(b) You are responsible for verifying the accuracy, completeness, and appropriateness of agent outputs for your specific use case.
5.3 Access Controls
(a) You must not grant agents unrestricted access to sensitive systems, databases, credentials, or infrastructure without implementing appropriate access controls, permission boundaries, and least-privilege principles.
(b) You must use the permission and budget governance features provided by the Service to limit agent actions to authorized scope.
5.4 Audit Trails
(a) You must maintain audit trails of agent actions sufficient to reconstruct the sequence of actions taken, decisions made, and outputs produced during each session.
(b) You must retain audit records for a period consistent with your regulatory and compliance obligations.
5.5 Responsibility for Agent Outputs
(a) You are solely responsible for all uses of agent outputs in your business, including any downstream consequences of relying on, deploying, or distributing those outputs.
(b) You acknowledge that AI agent outputs may contain errors, inaccuracies, or omissions, and that POM does not warrant the accuracy or fitness of any agent output for your specific use case, as set forth in the ToS.
6. Content Standards
You shall not use the Service to create, upload, transmit, or distribute content that:
6.1 Hate Speech, Harassment, and Threats
(a) Promotes hatred, discrimination, or violence against individuals or groups based on race, ethnicity, national origin, religion, gender, gender identity, sexual orientation, disability, or other protected characteristic.
(b) Constitutes harassment, bullying, intimidation, or credible threats of violence against any individual or group.
6.2 Child Exploitation Content
(a) Depicts, promotes, or facilitates the sexual exploitation of minors in any form.
6.3 Self-Harm and Violence
(a) Promotes, glorifies, or provides instructions for self-harm, suicide, or acts of violence.
(b) Provides detailed instructions for committing violent acts against specific individuals or groups.
6.4 Fraudulent and Deceptive Content
(a) Is intentionally false, misleading, or deceptive and is likely to cause harm or deceive others to their detriment.
(b) Constitutes or facilitates fraud, including financial fraud, phishing, impersonation for fraudulent purposes, or deceptive business practices.
7. Resource Usage
7.1 Cryptocurrency Mining
(a) You shall not use the Service, including AI agent sessions, compute resources, or any POM infrastructure, for cryptocurrency mining, blockchain validation, or similar computationally intensive activities unrelated to the intended purpose of the Service.
7.2 Resource Exhaustion
(a) You shall not intentionally consume excessive resources, generate excessive API calls, or otherwise engage in conduct designed to degrade the performance or availability of the Service for other Customers (denial-of-service).
(b) You shall not create or operate scripts, bots, or automated processes that place an unreasonable load on POM or AI Sub-processor infrastructure.
7.3 Budget and Rate Limits
(a) You must comply with all budget limits, rate limits, and usage quotas applicable to your subscription tier.
(b) You shall not circumvent, disable, or manipulate usage controls, budget enforcement mechanisms, or billing systems.
7.4 Billing Circumvention
(a) You shall not circumvent billing or payment mechanisms, including creating multiple accounts to exploit free-tier allocations, using fraudulent payment methods, or misrepresenting usage to avoid charges.
8. Enforcement
8.1 Graduated Consequences
POM reserves the right to enforce this AUP through graduated consequences, which may include, at POM's sole discretion:
(a) Warning: Written notice of the violation and a requirement to cure within a specified period.
(b) Suspension: Temporary suspension of your access to the Service, in whole or in part, pending resolution of the violation.
(c) Termination: Permanent termination of your account and all access to the Service.
The severity of enforcement will be determined based on the nature, severity, and recurrence of the violation, the intent of the violating party, and the impact on POM, other Customers, or third parties. POM is not obligated to follow a specific sequence of enforcement steps and may proceed directly to suspension or termination for serious violations.
8.2 Investigation
POM may investigate suspected violations of this AUP. You agree to cooperate with any investigation conducted by POM, including by providing information reasonably requested by POM to assess compliance with this AUP. POM will endeavor to conduct investigations in a manner that minimizes disruption to your legitimate use of the Service.
8.3 Content Removal and Access Restriction
POM may, without prior notice, remove, disable access to, or restrict distribution of any content or agent output that POM reasonably believes violates this AUP. POM may also disable or restrict access to specific Service features, agent capabilities, or AI Sub-processors as necessary to address violations.
8.4 Reporting to Authorities
POM reserves the right — and may be legally obligated — to report suspected illegal activity to appropriate law enforcement or regulatory authorities. POM will cooperate with law enforcement investigations to the extent required by applicable law.
8.5 No Refund for AUP Violations
If your access to the Service is suspended or terminated due to a violation of this AUP, you are not entitled to a refund of any prepaid fees, except as expressly required by applicable law. Unused subscription balances, credits, or prepaid amounts are forfeited upon termination for AUP violation.
9. Reporting Violations
9.1 How to Report
If you become aware of or suspect a violation of this AUP, please report it to:
Email: abuse@pom.dev
9.2 Reporting Process
When reporting a suspected violation, please include:
(a) Your contact information (name and email address).
(b) A description of the suspected violation, including the nature of the activity and any supporting evidence.
(c) The date(s) and time(s) of the suspected violation, if known.
(d) Any other information that may assist POM in investigating the report.
9.3 Response
POM will acknowledge receipt of violation reports within a reasonable time and will investigate reports in accordance with Section 8.2. POM may not be able to disclose the outcome of investigations due to privacy obligations or legal constraints.
9.4 Good Faith Reporting
POM will not retaliate against any Customer who reports a suspected violation of this AUP in good faith.
10. Changes to This AUP
POM may update this AUP from time to time. Material changes will be communicated in accordance with the notice provisions set forth in the ToS. Your continued use of the Service after the effective date of any updated AUP constitutes your acceptance of the updated AUP.
11. Contact Information
For questions about this AUP, please contact:
Email: abuse@pom.dev
General Legal Inquiries: legal@pom.dev
POM Acceptable Use Policy — Version 1.0
Effective Date: March 11, 2026
Questions about these terms? Contact us at legal@pom.dev