Acceptable Use Policy (AUP)
الإصدار 1.1آخر تحديث 2025-12-19
This Acceptable Use Policy (“AUP”) applies to your use of Brwse’s Website and Services.
1) You must use the Services lawfully
You may not use the Services to violate applicable laws or regulations, including privacy, export, sanctions, and intellectual property laws.
2) Prohibited activities
You may not:
- Attempt to gain unauthorized access to the Services, accounts, systems, or networks.
- Probe, scan, or test the vulnerability of the Services except as expressly permitted.
- Interfere with or disrupt the integrity or performance of the Services (e.g., denial-of-service attacks).
- Use the Services to distribute malware or harmful code, or to facilitate phishing or fraud.
- Use the Services to transmit unlawful, defamatory, harassing, or infringing content.
- Use the Services to collect, store, or transmit sensitive personal data (e.g., health data, government IDs, payment card data) unless explicitly agreed in writing and supported by the Services with appropriate safeguards.
- Send spam or unsolicited communications through the Services.
- Circumvent usage limits, rate limits, or security controls.
- Access, scrape, or harvest data from the Website/Services in a way that is not permitted by the Services’ intended functionality.
3) AI/automation safeguards (if applicable)
If the Services enable AI, automation, or agent-like behavior, you are responsible for:
- Configuring permissions and access appropriately (least privilege).
- Ensuring human review and oversight for high-risk actions.
- Preventing automated actions that could cause harm, unlawful outcomes, or unauthorized disclosure of data.
You may not use the Services to:
- Generate or facilitate malware, exploitation, or instructions intended to compromise systems.
- Impersonate individuals or entities in a misleading or deceptive manner.
- Make decisions that produce legal or similarly significant effects on individuals (for example, hiring, housing, credit, insurance eligibility, or medical decisions) without appropriate safeguards, human review, and compliance with applicable law.
4) Enforcement
We may investigate potential violations and may suspend or terminate access to the Services if we reasonably believe a violation has occurred, or to protect the Services, Customers, or third parties.
5) Reporting
Report suspected abuse or security issues to .