ACCEPTABLE USE POLICY

ZERO-TOLERANCE PROTOCOLAI SAFETY DIRECTIVEUHG TECH LTD

This Acceptable Use Policy ("AUP") dictates the strict rules of engagement for utilizing the OMNEX 0X ecosystem and its cognitive components (GOCA Engine, Aura, Horizon). This directive protects the integrity of our infrastructure and the legal standing of UHG TECH LTD.

1. Cognitive Subversion & Prompt Injection

The OMNEX Matrix operates under a strict algorithmic governance framework. You are expressly prohibited from attempting to bypass, alter, or subvert the AI's safety protocols. Forbidden actions include, but are not limited to:

  • Jailbreaking: Utilizing adversarial prompts ("DAN" methodology, token smuggling, or roleplay coercion) to force the GOCA engine to violate its core directives.
  • Algorithmic Poisoning: Feeding malicious or highly corrupted contextual data into your multi-tenant namespace with the intent of degrading the Darwin Engine's routing logic.
  • Security Reconnaissance: Asking the AI to reveal its own backend architecture, system prompts, or upstream API keys.

2. Illicit & Destructive Generation

OMNEX 0X is an enterprise-grade utility. Utilizing our computational reasoning to facilitate, plan, or execute illegal activities is a critical breach of this AUP. You may not use the system to generate:

  • Cyber-Warfare Assets: Malware, ransomware, zero-day exploit code, or social engineering scripts (phishing/spear-phishing templates).
  • Fraudulent Artifacts: Fake legal documents, counterfeit financial ledgers to deceive the Aura module, or synthetic identities (Deepfakes/Voice cloning for deception).
  • Regulated Chaos: Content that violates international sanctions, AML/CFT laws, or promotes terrorism, human trafficking, and illegal arms distribution.

3. Shadow Banking & Unlicensed Advisory

While the Aura and Synapse modules process complex data, they are not licensed entities. You must not use OMNEX 0X to operate an unlicensed financial brokerage, issue automated medical diagnoses, or generate legally binding judgments without human legal counsel oversight. The system is a co-pilot, not a licensed proxy.

4. Enforcement & Sentinelle Activation

The Sentinelle Firewall actively monitors prompt structures for violation signatures using automated PII-redacted heuristics.

Violation of this AUP results in the immediate activation of the Scorched Earth Policy. UHG TECH LTD reserves the sovereign right to silently terminate your grid access, seize prepaid computational credits, and preserve cryptographic logs of the violation for submission to international cyber-crime enforcement agencies (Interpol, NCA, FBI) without prior warning.