Permitted use
Use Real Runtime only for lawful applications and authorized workloads.
Prohibited use
- Illegal surveillance, deception, or impersonation.
- Targeted harassment, abuse, exploitation, or discrimination.
- Bypassing safeguards, rate limits, or scope constraints.
- Processing sensitive categories without lawful basis and controls.
- Reverse engineering or unauthorized extraction of protected methods.
Enforcement
Violations may result in suspension, key revocation, legal escalation, and mandatory remediation actions.