Legal & Compliance

Acceptable Use Policy

Document hash: f912bd1fec7e7390...

Acceptable Use Policy (AUP)

Effective Date: 05/15/2026Company: PerimeterEye

This Acceptable Use Policy (“AUP”) governs access to and use of the PerimeterEye platform, software, hardware, cloud services, mobile applications, APIs, websites, firmware, and related systems (collectively, the “Services”). By accessing or using the Services, Customer agrees to comply with this AUP.

PerimeterEye reserves the right to suspend, restrict, investigate, or terminate access to the Services for violations of this AUP.

1. Prohibited System Usage

Customer shall not use the Services:

for unlawful, fraudulent, harmful, abusive, or deceptive purposes;

to facilitate criminal activity;

to harass, stalk, intimidate, threaten, or invade the privacy rights of others;

in violation of applicable surveillance, wiretapping, recording, biometric, privacy, or data protection laws;

in a manner that interferes with PerimeterEye systems, infrastructure, operations, or other users;

to transmit malware, ransomware, spyware, malicious code, or harmful content;

to interfere with emergency services or public safety operations;

to perform unauthorized monitoring of individuals or property.

2. Illegal Surveillance Restrictions

Customer shall not use the Services:

to conduct illegal surveillance;

to record individuals in areas where there is a reasonable expectation of privacy;

to violate audio recording consent laws;

to collect biometric or facial recognition data unlawfully;

to target protected individuals or classes unlawfully;

to use the Services in violation of local, state, federal, or international privacy regulations.

Customer is solely responsible for determining the legality of surveillance activities in all jurisdictions where the Services are used.

3. Abuse and Misuse Restrictions

Customer shall not:

intentionally misuse or overload the Services;

interfere with normal operation of the platform;

exploit bugs, vulnerabilities, or unintended behaviors;

attempt to disrupt platform availability or integrity;

use the Services for spam, phishing, scraping, credential stuffing, or denial-of-service activities;

intentionally trigger false alarms, false escalation events, or improper emergency dispatches.

4. Credential Sharing Restrictions

Customer is responsible for maintaining the confidentiality of login credentials and account access.

Customer shall not:

share credentials outside authorized users;

resell or distribute account access;

allow unauthorized third parties to access the Services;

bypass authentication controls;

create fraudulent or misleading accounts.

Customer is responsible for all activity occurring under their account.

5. Reverse Engineering Prohibitions

Except where prohibited by applicable law, Customer shall not:

reverse engineer, decompile, disassemble, decode, or analyze the Services;

attempt to derive source code, models, firmware logic, hardware signaling methods, communication protocols, APIs, encryption methods, or system architecture;

extract training methods, AI behavior logic, or escalation workflows;

inspect or replicate proprietary spotlight control systems, tracking systems, or hardware control logic.

6. API Abuse Limitations

Customer shall not:

abuse, overload, scrape, or excessively query APIs;

bypass API rate limits or authentication requirements;

use automated systems to extract platform data without authorization;

attempt to discover undocumented endpoints or internal infrastructure;

use APIs in a manner that negatively impacts platform performance or security.

PerimeterEye may impose usage thresholds, rate limits, and access restrictions at its discretion.

7. Unauthorized Access Restrictions

Customer shall not:

access systems, devices, accounts, data, or infrastructure without authorization;

attempt privilege escalation;

intercept network traffic or internal communications;

bypass access controls or security protections;

probe, scan, or test vulnerabilities without written authorization.

Any unauthorized access attempt may result in immediate suspension and legal action.

8. Customer Responsibilities

Customer is responsible for:

maintaining lawful use of the Services;

securing local networks, passwords, and physical equipment;

ensuring authorized personnel use the Services;

maintaining internet and power connectivity;

complying with all applicable laws and regulations;

obtaining necessary permissions, notices, and consents related to surveillance or recording activities.

Customer remains solely responsible for actions taken using their account, devices, or installations.

9. Account Suspension and Termination

PerimeterEye may suspend, limit, disable, or terminate access to the Services immediately if Customer:

violates this AUP;

creates security risks;

engages in abusive or fraudulent activity;

attempts unauthorized extraction or duplication of PerimeterEye technology;

interferes with platform integrity or operations;

violates intellectual property rights;

exposes PerimeterEye to legal or regulatory risk.

PerimeterEye may preserve logs, recordings, metadata, and evidence related to violations.

10. Law Enforcement Cooperation

PerimeterEye reserves the right to cooperate with law enforcement, regulators, courts, and government authorities regarding:

unlawful activity;

threats to public safety;

fraud or cybercrime;

unauthorized access attempts;

intellectual property theft;

abuse of the Services.

PerimeterEye may disclose information where legally required or reasonably necessary to protect its rights, systems, users, or the public.

11. Unauthorized Hardware or Software Extraction

Customer shall not:

extract firmware, software, hardware logic, or system components;

access embedded systems outside intended interfaces;

remove, bypass, or tamper with protections designed to prevent extraction;

copy or clone hardware communication methods, control systems, or embedded logic.

Unauthorized extraction attempts constitute material breach of this Agreement.

12. Firmware Tampering Prohibitions

Customer shall not:

modify firmware;

install unauthorized firmware;

alter bootloaders or hardware protections;

bypass security controls;

inject malicious or unauthorized code;

disable safety or monitoring systems.

PerimeterEye reserves the right to disable unsupported or modified systems.

13. System Circumvention Restrictions

Customer shall not:

bypass licensing mechanisms;

evade subscription requirements;

disable authentication or telemetry systems;

interfere with security protections;

circumvent monitoring, billing, logging, or enforcement systems;

use unauthorized tools to alter platform behavior.

14. Intellectual Property Protection

All software, firmware, hardware designs, APIs, AI systems, workflows, algorithms, communication methods, interfaces, trademarks, branding, content, and technology associated with the Services are protected intellectual property owned by PerimeterEye and/or its licensors.

No rights are granted except those expressly authorized in writing.

15. Prohibited Copying, Cloning, or Replication

Customer shall not:

copy or replicate PerimeterEye hardware or software;

clone system architecture or proprietary workflows;

reproduce communication protocols;

create derivative products based on PerimeterEye technology;

manufacture competing systems using PerimeterEye intellectual property;

use PerimeterEye technology to train competing systems or models.

16. Internal Communications Protocol Restrictions

Customer shall not:

intercept or analyze proprietary device communications;

decode internal signaling methods or transport protocols;

monitor internal hardware buses, encrypted traffic, firmware communications, or backend infrastructure without authorization;

attempt to replicate proprietary hardware interaction methods.

17. Legal Enforcement Rights

PerimeterEye reserves all rights and remedies available under applicable law, including:

injunctive relief;

monetary damages;

recovery of investigative costs;

recovery of attorneys’ fees where permitted;

seizure or disabling of unauthorized systems;

reporting violations to law enforcement and regulatory authorities.

Unauthorized copying, extraction, or misuse of PerimeterEye technology may result in civil and criminal liability.

18. Benchmarking and Competitive Analysis Restrictions

Customer shall not, without prior written authorization:

publish performance testing;

conduct comparative benchmarking;

perform competitive analysis;

disclose stress testing or security evaluation results;

use the Services to develop competing products or services.

19. Resale and Rehosting Restrictions

Customer shall not:

resell access to the Services;

sublicense software or cloud functionality;

rehost PerimeterEye software or infrastructure;

operate unauthorized managed services using the platform;

provide third-party commercial access without written authorization.

Authorized enterprise or reseller programs require separate written agreements.

20. Security Testing Restrictions

Customer shall not conduct:

penetration testing;

vulnerability scanning;

fuzzing;

exploit testing;

red-team exercises;

protocol analysis;

infrastructure scanning;

hardware security analysis

without PerimeterEye’s prior written authorization.

Approved testing may be subject to scope limitations, monitoring requirements, and separate agreements.

21. Monitoring and Enforcement

PerimeterEye reserves the right to:

monitor platform usage;

investigate suspected violations;

audit suspicious activity;

restrict or disable systems posing security or operational risks;

preserve forensic evidence;

take corrective technical or legal action.

22. Changes to this AUP

PerimeterEye may update or modify this AUP at any time. Continued use of the Services after updates constitutes acceptance of the revised policy.

23. Contact Information

Questions regarding this AUP may be directed to:

PerimeterEye Legal DepartmentEmail: [email protected]: PerimeterEye.com