Legal
Acceptable Use Policy
Last updated:
About This Policy
This Acceptable Use Policy ("AUP") outlines the rules and guidelines for using AI Photo Detect. It is designed to protect our users, our Service, and the broader community. By using our Service, you agree to comply with this policy.
Overview
This Acceptable Use Policy applies to all users of the AI Photo Detect service, including the web application, REST API, and any related services (collectively, the "Service") operated by aiphotodetect.com / Internet Mate Ltd ("Company", "we", "us", or "our").
This AUP is incorporated into and forms part of our Terms of Service. Capitalised terms not defined in this AUP have the meanings given to them in the Terms of Service.
We may update this AUP from time to time. Continued use of the Service after changes constitutes acceptance of the revised policy. Material changes will be notified via email or through the Service.
Permitted Uses
AI Photo Detect is designed for legitimate purposes related to verifying the authenticity of images. The following uses are expressly permitted:
2.1 Journalistic & Editorial
- Fact-checking and verifying news imagery
- Editorial review processes for publications
- Newsroom verification workflows
- Documentary research and authentication
2.2 Platform & Content Moderation
- Social media content moderation
- Marketplace listing verification
- User-generated content review
- Community platform safety measures
- Dating platform profile verification
2.3 Business & Professional
- Brand protection and intellectual property verification
- Insurance claim documentation review
- Legal discovery and evidence authentication
- Academic research on AI-generated imagery
- Corporate communications verification
- Marketing asset authenticity checks
2.4 Personal Use
- Verifying images received online or via messaging
- Checking social media content authenticity
- Educational purposes and learning about AI imagery
- Personal due diligence
Prohibited Content
Zero Tolerance
The following content is strictly prohibited. Uploading such content will result in immediate account termination and may be reported to law enforcement authorities.
3.1 Absolutely Prohibited (Criminal)
- Child Sexual Abuse Material (CSAM): Any imagery depicting the sexual exploitation or abuse of minors. This includes AI-generated CSAM. All suspected CSAM will be immediately reported to the National Crime Agency (NCA) in the UK and NCMEC in the US, along with all available account information.
- Non-consensual intimate imagery: Sexual or intimate images of individuals shared without their consent ("revenge porn"), regardless of whether the images are real or AI-generated.
- Terrorism and violent extremism: Content that promotes, glorifies, or incites terrorism or violent extremist ideologies.
- Evidence of violent crimes: Imagery depicting murder, assault, torture, or other violent criminal acts.
3.2 Prohibited Content Categories
- Illegal content: Any content that violates applicable laws in the United Kingdom or the jurisdiction where you are located
- Harassment material: Images created or used to harass, intimidate, or threaten individuals
- Defamatory content: False images designed to damage someone's reputation
- Stolen personal images: Private photographs obtained without authorisation
- Malware or harmful code: Files containing viruses, trojans, or other malicious software disguised as images
3.3 Content Requiring Authorisation
The following content may only be uploaded with proper authorisation:
- Copyrighted material: Images you do not own or have rights to analyse
- Confidential business documents: Ensure you have authority to process such materials
- Images containing personal data of others: Ensure you have a lawful basis under data protection law
Prohibited Activities
The following activities are prohibited when using the Service:
4.1 Service Abuse
- Attempting to circumvent usage limits, rate limiting, or access controls
- Using automated tools to scrape, crawl, or harvest data from the Service
- Sharing account credentials or API keys with unauthorised parties
- Creating multiple accounts to evade restrictions or abuse free tiers
- Reselling or redistributing the Service without authorisation
- Using the Service to benchmark or develop competing products
4.2 Technical Interference
- Attempting to gain unauthorised access to our systems or other users' accounts
- Reverse engineering, decompiling, or disassembling any part of the Service
- Introducing malware, viruses, or other harmful code
- Conducting denial-of-service attacks or flooding our systems
- Exploiting vulnerabilities or security flaws (without responsible disclosure)
- Interfering with or disrupting the integrity of the Service
4.3 Fraudulent & Deceptive Use
- Using the Service to facilitate fraud, phishing, or scams
- Creating fake or misleading detection reports
- Misrepresenting the source, accuracy, or nature of detection results
- Using results to make false claims about image authenticity
- Impersonating another person or organisation
- Providing false information during registration or payment
4.4 Harmful Applications
- Using the Service to facilitate harassment or stalking
- Building applications that discriminate against individuals or groups
- Using results to harm, defame, or embarrass individuals
- Creating deepfake detection tools designed to improve deepfake creation
- Training AI models to evade detection using our Service
API Usage Rules
If you access the Service via our REST API, the following additional rules apply:
5.1 API Key Management
- Keep your API keys confidential and secure
- Do not embed API keys in client-side code, public repositories, or mobile apps
- Rotate API keys periodically and immediately if compromised
- Use separate API keys for development and production environments
- Do not share API keys between different applications or clients
5.2 Rate Limiting & Fair Use
- Respect the rate limits associated with your subscription plan
- Implement exponential backoff when receiving rate limit errors
- Do not attempt to circumvent rate limits through multiple accounts or keys
- Contact us if you require higher limits for legitimate use cases
5.3 Integration Requirements
- Implement proper error handling for API responses
- Cache results appropriately to minimise unnecessary API calls
- Include appropriate attribution if displaying results to end users
- Do not make synchronous bulk requests; use appropriate queuing
- Ensure your integration complies with all applicable laws
5.4 Prohibited API Uses
- Building a service that directly competes with AI Photo Detect
- Reselling API access without a partnership agreement
- Using the API to train machine learning models
- Storing or caching detection results beyond your operational needs
- Making API calls with the primary purpose of reverse engineering our algorithms
Security Requirements
All users must maintain reasonable security practices:
6.1 Account Security
- Use a strong, unique password for your account
- Enable multi-factor authentication when available
- Do not share your login credentials with others
- Log out of shared or public devices after use
- Notify us immediately if you suspect unauthorised access
6.2 Responsible Disclosure
If you discover a security vulnerability in the Service:
- Report it to support@aiphotodetect.com promptly
- Do not exploit the vulnerability or access data belonging to others
- Allow us reasonable time to address the issue before any public disclosure
- We will not take legal action against good-faith security researchers
Reporting Violations
We take violations of this Acceptable Use Policy seriously. If you become aware of any violation, please report it to us:
Report a Violation
- Email: support@aiphotodetect.com
For general policy violations and abuse reports
- Urgent/Illegal Content: support@aiphotodetect.com
For CSAM, violence, or other urgent matters requiring immediate attention
- Security Issues: support@aiphotodetect.com
For security vulnerabilities and responsible disclosure
When reporting a violation, please include:
- A clear description of the violation
- Any relevant evidence or screenshots
- The date and time of the incident (if known)
- Any user identifiers or URLs involved
All reports are treated confidentially. We will not disclose your identity to the reported party without your consent, except where required by law.
Enforcement
We reserve the right to investigate and take appropriate action against violations of this Acceptable Use Policy.
8.1 Investigation
We may investigate suspected violations by:
- Reviewing account activity and uploaded content
- Analysing API usage patterns
- Gathering information from third parties
- Cooperating with law enforcement where appropriate
8.2 Actions We May Take
Depending on the severity of the violation, we may:
| Severity | Potential Actions |
|---|---|
| Minor | Warning email, temporary rate limiting, request to cease activity |
| Moderate | Temporary account suspension, API key revocation, content removal |
| Severe | Permanent account termination, forfeiture of fees, legal action |
| Criminal | Immediate termination, law enforcement referral, evidence preservation |
8.3 Appeals
If you believe enforcement action was taken in error, you may appeal by contacting support@aiphotodetect.com within 14 days of the action. Appeals will be reviewed by a different team member than the original decision-maker.
8.4 Law Enforcement Cooperation
We cooperate with law enforcement agencies investigating criminal activity. This includes:
- Mandatory reporting of CSAM to the National Crime Agency (UK) and NCMEC (US)
- Responding to valid legal process (court orders, warrants, subpoenas)
- Preserving evidence when required by law
- Proactive reporting of serious criminal activity
No Liability Waiver
Violation of this Acceptable Use Policy does not limit any liability you may have under our Terms of Service, applicable laws, or otherwise. You remain responsible for any damages caused by your misuse of the Service.
Questions About This Policy?
If you have questions about what is or isn't permitted under this Acceptable Use Policy, please contact us before proceeding.