Legal Hub
Agreements, policies, and information about how we operate and protect your data.
Acceptable Use Policy
This Acceptable Use Policy (this “AUP”) applies to your access to and use of walkandcode.com, the Walk and Code web application, and any related software, voice features, recordings, APIs, integrations, plugins, extensions, desktop or mobile applications, future products, content, functionality, and services made available by Spenat Labs Inc. (d/b/a Walk and Code) (“Walk and Code,” “Company,” “we,” “us,” or “our”) (collectively, the “Service”).
This AUP is incorporated into and forms part of our Terms and Conditions. Capitalized terms not defined here have the meanings given in the Terms and Conditions. If there is a conflict between this AUP and the Terms and Conditions, the Terms and Conditions control unless we expressly state otherwise.
1. Purpose
Walk and Code is intended to help users with coding, software development, and related workflows. It is not intended to be used for unlawful, abusive, harmful, infringing, deceptive, dangerous, or unauthorized activities.
You may not use the Service, or permit any other person to use the Service, in any way that violates this AUP.
2. General Rule
You may use the Service only in a lawful, authorized, responsible, and non-harmful manner. You are solely responsible for:
- your conduct;
- your account and credentials;
- all prompts, instructions, code, repositories, files, data, recordings, and other content you submit to or connect with the Service;
- any outputs generated by or through the Service;
- any action taken by the Service based on your inputs, connected systems, settings, or instructions; and
- ensuring that your use complies with applicable law, contractual obligations, confidentiality obligations, workplace rules, open-source license obligations, third-party terms, export controls, sanctions, and this AUP.
3. Prohibited Uses
You may not use the Service for, or in connection with, any of the following:
3.1 Illegal Activity
- violating any applicable law, regulation, court order, or governmental requirement;
- assisting, encouraging, planning, or facilitating unlawful conduct;
- violating export controls, sanctions, trade restrictions, or embargoes;
- processing or accessing data, code, systems, or accounts without proper authorization; or
- using the Service in any way that could expose Walk and Code, its users, vendors, or partners to legal or regulatory risk.
3.2 Harmful or Dangerous Software
- creating, generating, modifying, testing, improving, distributing, deploying, or facilitating malware, ransomware, spyware, trojans, worms, destructive code, credential theft tools, keyloggers, botnets, exploit kits, rootkits, or unauthorized remote access tools;
- creating or enabling phishing kits, scam tooling, social engineering kits, or fraud automation;
- generating or improving code intended to steal credentials, secrets, tokens, payment data, personal data, or confidential data;
- creating or deploying code intended to disable, destroy, exfiltrate, corrupt, encrypt, sabotage, surveil, or impair systems, data, devices, services, or infrastructure without authorization;
- building or assisting with illegal cyber intrusion, privilege escalation, persistence, lateral movement, denial-of-service activity, evasion, or exploitation; or
- using the Service in connection with any illegal or otherwise harmful software or activity.
For purposes of this AUP, “harmful software” includes software, scripts, prompts, workflows, tools, or code intended to cause harm, enable unauthorized access, evade security controls, compromise privacy, facilitate fraud, or materially increase the ability of a person to engage in unlawful, abusive, or malicious conduct.
3.3 Unauthorized Access and Security Violations
- probing, scanning, testing, or attempting to assess vulnerabilities of systems, networks, accounts, repositories, APIs, applications, or environments without express authorization;
- bypassing, defeating, or circumventing authentication, access restrictions, rate limits, safety measures, or security controls;
- scraping, harvesting, extracting, or collecting data in an unauthorized manner;
- using stolen credentials, tokens, sessions, or secrets;
- attempting to gain unauthorized access to any account, repository, environment, device, infrastructure, or service; or
- using the Service to assist with unauthorized monitoring, surveillance, interception, or collection of communications or data.
3.4 Fraud, Deception, and Abuse
- impersonating any person or entity or misrepresenting affiliation, identity, or authorization;
- engaging in fraud, scams, deceptive practices, or misrepresentation;
- sending spam, abusive outreach, or unauthorized bulk communications;
- using the Service to generate misleading, deceptive, or fraudulent content, code, or workflows; or
- using the Service in connection with identity theft, payment fraud, account takeover, or similar misconduct.
3.5 Intellectual Property, Confidentiality, and Privacy Violations
- infringing, misappropriating, or violating any intellectual property right, moral right, publicity right, privacy right, confidentiality obligation, trade secret, or other right;
- uploading, connecting, processing, or sharing materials you do not have the right to use;
- using the Service to access, expose, reproduce, modify, or distribute confidential or proprietary information without authorization; or
- using the Service in a way that violates privacy, data protection, employment, or recording laws.
3.6 Harm to Others
- harassing, threatening, stalking, bullying, or abusing any person;
- facilitating discrimination, exploitation, or targeted abuse;
- generating content or code intended to intimidate, extort, or coerce;
- using the Service to promote violence, terrorism, or other harmful conduct; or
- using the Service in a way that could reasonably create a material risk of harm to persons, organizations, or property.
3.7 Misuse of the Service Itself
- reverse engineering, decompiling, disassembling, reproducing, copying, scraping, framing, mirroring, benchmarking, or attempting to discover the source code, structure, safety systems, prompts, workflows, or underlying components of the Service, except where expressly allowed by law and only to the minimum extent permitted by law;
- using the Service to build a competing product or service;
- interfering with, disrupting, overloading, degrading, or impairing the Service or infrastructure supporting it;
- attempting to evade fees, usage tracking, metering, seat restrictions, account limitations, or plan restrictions;
- sharing accounts, credentials, seats, or access in violation of our Terms;
- using bots or automation to access the Service in a manner not authorized by us; or
- accessing the Service for any purpose that is abusive, excessive, or outside its intended use.
3.8 High-Risk or Inappropriate Reliance
You may not use or rely on the Service as a substitute for appropriate human oversight, professional advice, or required safeguards in circumstances where errors could foreseeably cause significant harm.
Without limiting the foregoing, you may not represent that outputs generated by the Service are guaranteed accurate, safe, secure, lawful, production-ready, or fit for any particular purpose.
4. Authorized Access Only
You may connect or submit only code, repositories, accounts, tools, services, systems, files, environments, and other materials that:
- you own; or
- you are expressly authorized to access, use, modify, connect, process, and allow the Service to interact with.
You are solely responsible for confirming that you have all necessary rights, permissions, notices, and consents before using the Service with any third-party account, repository, environment, confidential information, codebase, or dataset.
5. Account Sharing and Credential Misuse
Your account is personal and non-transferable unless we expressly authorize otherwise in writing.
You may not:
- share your login, credentials, session, or access with another person;
- allow another person to use your account;
- resell, rent, sublicense, lend, lease, or transfer access to the Service;
- create accounts using false or misleading information; or
- attempt to circumvent seat, user, subscription, or account limitations.
6. Monitoring and Enforcement
We may, but are not obligated to, monitor use of the Service for compliance with this AUP, our Terms and Conditions, and applicable law.
If we believe, in our sole discretion, that you have violated this AUP, we may take any action we consider appropriate, including:
- warning you;
- removing, disabling, restricting, or blocking access to content, features, accounts, or integrations;
- suspending or terminating your account immediately and without prior notice;
- preserving logs, recordings, transcripts, prompts, files, metadata, and other evidence;
- reporting conduct to law enforcement, regulators, third-party providers, affected persons, or other appropriate parties;
- cooperating with investigations; and
- pursuing any legal or equitable remedy available to us.
We may take such action without refund, without liability, and without any obligation to provide advance notice, explanation, or an opportunity to cure.
7. Our Discretion
We may determine, in our sole discretion, whether conduct violates this AUP. We may also determine, in our sole discretion, whether any use of the Service is illegal, harmful, abusive, unauthorized, high-risk, inappropriate, or likely to expose us, our users, vendors, or others to harm, liability, disruption, or reputational damage.
We reserve the right to act proactively where we suspect misuse, even if we have not completed an investigation or obtained external confirmation.
8. Relationship to Other Terms
This AUP supplements, and does not limit, any restrictions or rights set forth in:
- the Terms and Conditions;
- the Privacy Policy;
- the Cookie Policy;
- any service-specific terms, order forms, or policies; and
- any applicable law.
A violation of this AUP is also a violation of the Terms and Conditions.
9. Changes to This AUP
We may update this AUP at any time in our sole discretion. The updated version becomes effective when posted, unless we state otherwise. By continuing to access or use the Service after an updated AUP becomes effective, you agree to the updated AUP.
10. Contact
If you have questions about this AUP, contact:
Spenat Labs Inc. (d/b/a Walk and Code)
Email: hello@walkandcode.com