1. Protected technology
Real Runtime methods, system architecture, scoring logic, and implementation patterns are protected proprietary technology.
2. Prohibited activities
- Reverse engineering, decompilation, reconstruction, or extraction of protected methods.
- Model distillation or competitive model training using service outputs in a way that substitutes core Real Runtime value.
- Circumvention of scope boundaries, controls, licensing metering, or technical protections.
- Publishing benchmark, proprietary architecture, or exploit details without prior written consent.
3. Confidentiality and disclosure controls
Any non-public implementation details remain confidential and are additionally governed by NDA where executed.
4. Remedies
Unauthorized use may cause irreparable harm; Real Runtime may seek immediate injunctive relief, suspension, key revocation, and other legal remedies.
5. Survival
IP protection, confidentiality, and remedy clauses survive termination of access or subscription.