Acceptable Use Policy
Last Updated: December 28, 2025
This Acceptable Use Policy ("AUP") governs the usage of services provided by FifthBoston Holdings Corp (doing business as FifthBoston.Services) ("Services"). This policy is designed to protect our network, our customers, and the broader internet community from irresponsible or illegal activity.
By accessing our infrastructure, AI platforms, or deploying Autonomous Agents on our network, you agree to strictly adhere to this policy. Violations will result in immediate suspension or termination of services.
1. PROHIBITED AI ACTIVITIES
You may not use our AI Services (including model inference, fine-tuning, or agent deployment) for any of the following:
- Jailbreaking & Bypass: Attempting to bypass, disable, or reverse-engineer safety filters, content moderation systems, or guardrails ("jailbreaking") is strictly prohibited.
- Prompt Injection: Engaging in adversarial attacks such as "prompt injection" to manipulate model behavior outside of intended parameters.
- Automated Harassment: Using AI agents to generate spam, targeted harassment, or "swarming" attacks against individuals or digital platforms.
- Non-Consensual Sexual Imagery (NCII): Any generation, storage, or distribution of deepfakes, NCII, or child sexual abuse material (CSAM) will be reported immediately to law enforcement (NCMEC) and result in a permanent ban.
- Political Disinformation: Generating high-volume synthetic media intended to mislead voters or interfere with democratic processes.
2. AUTONOMOUS AGENT CONDUCT
Customers deployment of Autonomous Agents must adhere to the following operational standards:
Kill Switch Requirement
All autonomous agents must have a functional, hard-coded "kill switch" accessible to the Provider. You must not deploy "runaway" processes that cannot be terminated externally.
- Rate Limiting: Agents must respect the
robots.txtand API rate limits of any third-party services they interact with. - Attribution: Agents interacting with humans must clearly disclose their non-human identity. Deceptive impersonation is prohibited.
- High-Frequency Trading: Unregulated high-frequency financial trading or market manipulation via our low-latency infrastructure is prohibited without prior written authorization and regulatory proof.
3. NETWORK & INFRASTRUCTURE ABUSE
System Security
You constitute a violation of this AUP if you:
- Unauthorized Access: Attempt to access, probe, or scan improper ports or services on another customer’s network or our internal infrastructure.
- DDoS & Swarming: Launching Distributed Denial of Service (DDoS) attacks or coordinating "bot swarms" to overwhelm target systems.
- Malware Distribution: Hosting or distributing viruses, worms, trojans, or ransomware.
4. CONTENT STANDARDS
Our "Hybrid" model allows for diverse hosting, but the following content is banned from our physical and digital infrastructure:
- Illegal Material: Copyrighted works without license, commercial audio/video piracy (Warez), and illicit software.
- Threats & Violence: Content promoting terrorism, self-harm, or specific threats of violence against individuals.
- Phishing & Fraud: Hosting phishing sites, HYIP (High Yield Investment Programs), or Ponzi schemes.
5. ENFORCEMENT & REPORTING
Investigation: We reserve the right to investigate any suspected violation of this policy, including reviewing AI logs and network traffic.
Action: We may remove content, suspend specific agents, or terminate your entire account without notice for severe violations.
Reporting Abuse: If you witness a violation of this policy or suspect an agent hosted on our network is acting maliciously, please contact: abuse@fifthboston.net.
FifthBoston.Services
1-833-657-0001
info@fifthboston.net
