Skip to main content
LEGAL

Acceptable Use Policy

Mandatory guidelines and permissible boundaries for utilizing the LITT platform.

Effective: September 20, 2025PLATFORM POLICY
1.

Overview and Purpose

This acceptable use policy establishes the mandatory guidelines and permissible boundaries for utilizing the LITT platform. To maintain a secure, reliable, and compliant environment for all, user must adhere strictly to these rules.

By accessing or interacting with LITT, user explicitly agrees to comply with all provisions set forth in this document. LITT reserves the right to evaluate the conduct of user and enforce these terms at its sole discretion.

3.

Protection of System Integrity

The security and stability of LITT are paramount. When interacting with the infrastructure, user must not:

Attempt to bypass, disable, or circumvent any security protocols, authentication measures, or access controls implemented by LITT.

Introduce, upload, or transmit any viruses, trojan horses, worms, logic bombs, or other malicious software designed to disrupt or damage the platform or the hardware of any other user.

Conduct unauthorized vulnerability scanning, penetration testing, or stress testing on the LITT network or its associated cloud infrastructure.

Interfere with or disrupt the normal operation of the service, including overloading, "flooding," or executing denial-of-service attacks.

4.

Artificial Intelligence Model Restrictions

LITT invests heavily in its proprietary algorithms. To protect this intellectual property, user is expressly forbidden from:

Using the platform, its outputs, or its underlying architecture to train, develop, or refine a competing artificial intelligence model, legal technology software, or large language model (LLM).

Reverse-engineering, decompiling, or disassembling the AI models or any integrated third-party technology.

Intentionally submitting prompts or inputs designed to "jailbreak" the AI, bypass safety guardrails, or force the system to generate prohibited or restricted content.

5.

Automated Access and Scraping

LITT requires human oversight and responsible integration. Therefore, user may not:

Utilize unauthorized bots, spiders, scrapers, or other automated scripts to access, index, or extract data from the LITT interface or databases.

Access the LITT API outside of explicitly provided developer documentation and authorized enterprise agreements.

Mass-generate queries or outputs in a manner that disproportionately consumes computational resources and degrades the experience for others.

6.

Data Uploads and Third-Party Rights

User retains responsibility for all data introduced into the ecosystem. User must ensure that:

User possesses the lawful right, explicit consent, or appropriate legal basis to upload, process, and analyze any proprietary documents, client files, or personally identifiable information inputted into LITT.

The inputted data does not infringe upon the intellectual property rights, copyrights, trademarks, or strict privacy rights of any third party.

7.

Enforcement and Account Suspension

LITT actively monitors platform usage to ensure compliance with this acceptable use policy. If LITT determines, in its sole judgment, that user has violated any of these provisions, LITT may take immediate remedial action.

This includes, but is not limited to, issuing a formal warning, temporarily suspending access, permanently terminating the account of user, or cooperating with legal authorities in the event of criminal conduct.

LITT bears no liability for any loss of access or data resulting from the enforcement of this policy against an offending user.