Terms of Service
These terms outline the core expectations for using AISEC, including account responsibility, acceptable use, service access, confidentiality, and termination mechanics.
Accounts
Customer and user responsibilities
Customers are responsible for the people they authorise into the tenant and for the information they choose to upload or process within the service.
- Keep credentials secure and enable stronger controls like MFA where offered.
- Ensure workspace content is lawful to process and appropriate for the intended workflows.
- Use roles and approval flows responsibly so changes remain attributable and reviewable.
Use
Acceptable use and service limits
AISEC is intended for legitimate governance, security, and compliance work. Abuse, misuse, or attempts to bypass security controls are not permitted.
- Do not attempt to interfere with service availability, tenant isolation, or access controls.
- Do not upload malicious content or use the service for unlawful activity.
- AI-generated content is an assistive output and should not be treated as legal advice or unreviewed final policy.
Commercial
Availability, termination, and confidentiality
Commercial terms may be supplemented by an order form or separate agreement, but the baseline expectations stay consistent.
- Service availability targets and maintenance practices are communicated through the status process.
- Either party may terminate in line with the governing agreement, after which access and retained data handling are managed according to the contract and law.
- Each party is expected to protect confidential information shared in connection with the service.
Related
Keep exploring
Need the operational context too?
The status and security pages explain how service availability and protection measures complement these baseline terms.