Zum Hauptinhalt wechseln

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Diese Seite ist in Ihrer Sprache nicht verfügbar, Deutsch. Sie können sie unten in der Originalsprache lesen, Englisch.

Pega Products and Services Acceptable Use Policy

This Acceptable Use Policy (the "AUP") sets forth certain requirements for your organization (“You” or “Your”) and your end users that use any Pega products or services (collectively referred to as the “Services”). Pega may revise this AUP from time to time so please review this on a regular basis. Violating this AUP may result in suspension or termination of services. You agree not to use or misuse the Services.  You also agree not to do anything that would affect the confidentiality, integrity or availability of any computer, network, software application, communications systems or network device (each a “System”).

UNLAWFUL AND OTHER USES WHICH ARE NOT PERMITTED: using the Services for any illegal, harmful, fraudulent, infringing or offensive use, or to display or to store or transmit content or data that is illegal, harmful, fraudulent, infringing or offensive use, or to use the Services or display, store, or transmit content or data that is invasive of privacy, infringing, obscene, libelous, or that is otherwise unlawful or tortious, or to carry out infringing or unlawful activities. Activities which are prohibited (except when specifically allowed as part of an approved vulnerability test which adheres to the Vulnerability Testing Policy) include but are not limited to the following:

  • Unauthorized Access: accessing or using a System without permission including attempts to breach or otherwise circumvent any security or authentication measures. Also accessing or searching the Services by any means other than our publicly supported interfaces (for example, “scraping”);
  • Interception: monitoring of data or traffic on a System without permission;
  • Falsification of Origin: forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision;
  • Tampering: accessing, tampering with, or using non-public areas or parts of the Services, or shared areas of the services where you are not authorized;
  • Network Abuse: maliciously interfering with, degrading the performance of, or disrupting any user, host, or network. Network abuse activities which are forbidden include but are not limited to: Denial of Service (“DOS”); or other activity with the intent to overload, flood, or spam any part of the Services;
  • Harmful Content: supplying content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots, or intentionally sending malware;
  • Monitoring or Crawling: monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled;
  • Intentional Interference: interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques;
  • Operation of Certain Network Services: operating network services like open proxies, open mail relays, or open recursive domain name servers;
  • Avoiding System Restrictions: using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions;
  • Unauthorized Communications: sending, distributing, publishing or facilitating the sending of unsolicited or unauthorized communications, promotions or advertisements, or spam;
  • Spoofing and Phishing: sending altered, deceptive, or false source-identifying information, including "spoofing" or "phishing";
  • Collection of Messages from another service provider: collecting replies to messages sent from another service provider if those messages violate this AUP or the acceptable use policy of that provider;
  • Copy/Interface service: violating copyrights by copying service or interface to Services or permitting other individuals or entities to copy services;
  • Abuse the Services: abusing the services in any manner that circumvents their intended use;
  • Selling the Services: selling the services or services account information obtained from the services including, but not limited to, providing unauthorized access to or use of activation instructions;
  • Use of Automated Means: using automated or other means to access the Services other than by using our official interface and/or APIs;
  • Infringing Content: supplying content that infringes or misappropriates the intellectual property or proprietary rights of others;
  • Illegal, Harmful or Fraudulent Activities: engaging in any activities that are illegal, that violate the rights of others, or that may be harmful to others, our operations or reputation, including disseminating, promoting or facilitating child exploitation or abuse, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming; and
  • Offensive Content: supplying content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.

In addition, the following terms apply to the use of Services that incorporate or use Generative Artificial Intelligence (GenAI) technology

Use Restrictions:

You may not use, or assist others in using, the Services to:

  • Violate the intellectual property, privacy, or publicity rights of others, including through unauthorized tracking, monitoring, or identification;
  • Generate or disseminate content that depicts a person’s voice, likeness, or identity including unauthorized impersonation and non-consensual sexual imagery without appropriate consent or legal rights;
  • Circumvent or attempt to bypass safety filters and functionality, content moderation, or prompt models to act in a manner that violates our policies;
  • Incite violence, hatred, or discrimination against individuals or groups;
  • Disclose or misuse personal, confidential, or sensitive information without appropriate consent; 
  • Create content that is psychologically or emotionally harmful; 
  • Influence political campaigns or interfere with democratic processes;
  • Use for surveillance, censorship, or law enforcement without lawful authority;
  • Facilitate or promote self-harm or harm to others;
  • Generate or distribute hate speech or discriminatory content;
  • Harass, bully, intimidate, or abuse individuals or groups;
  • Misrepresent AI-generated content as human-created with the intent to deceive;
  • Generate or disseminate false, misleading, or deceptive information; 
  • Develop or improve a similar or competing product or service, including to train competing GenAI models, except as expressly approved by Pega, or supporting any third party’s attempt at any of the conduct restricted in this sentence;
  • Undertake any other practices prohibited under applicable AI law, including anything prohibited under the European Artificial Intelligence Act (EU AI Act); and
  • For any use that would result in the Services being declared a high-risk system or that otherwise qualify as “high-risk” under the EU AI Act or applicable law or regulation. 

Use of Pega GenAI.

  • Pega GenAI utilizes prompts inputted by an end user. To use Pega GenAI, You must ensure prompts are appropriate and do not violate this Acceptable Use Policy or any applicable agreement between you and Pega.  You shall not, and shall ensure end users do not, override any protections put in place by Pegasystems.
  • If You use Pega GenAI Connect to build custom functionality, You shall provide sufficient detail of such custom functionality to Pegasystems upon request by Pegasystems. If Pegasystems determines that such custom functionality is not an appropriate use of Pega GenAI, then You shall alter or no longer use such custom functionality.  Pegasystems may limit or turn off access to Pega GenAI for any non-appropriate use in Pegasystems’ discretion.
  • You shall be responsible for any use of Generative AI by You if such use involves an API key to access such Generative AI obtained by You.
  • If you use the GenAI or machine learning Services to make consequential decisions, you must evaluate the potential risks of your use case and implement appropriate human oversight, testing, and other use case-specific safeguards to mitigate such risks. Consequential decisions include, but are not limited to, those impacting a person’s fundamental rights, health, or safety (e.g., medical diagnosis, judicial proceedings, access to critical benefits like housing or government benefits, opportunities like education, decisions to hire or terminate employees, or access to lending/credit, and providing legal, financial, or medical advice). You agree to provide information about your intended uses of the GenAI or machine learning Services (“AI/ML Services”) and Your compliance with this AUP to Pegasystems upon request.
  • You and your end users are responsible for all decisions made, advice given, actions taken, and failures to take action based on your use of AI/ML Services. AI/ML Services use machine learning models that generate predictions based on patterns in data. Output generated by a machine learning model is probabilistic, and generative AI may produce inaccurate or inappropriate content. Outputs should be evaluated for accuracy and appropriateness for your use case.

Pega has the right to investigate suspected violations of this AUP. In addition, Pega has the right to report suspected violations of this AUP to applicable law-enforcement authorities or third parties, and to cooperate with any investigation of illegal activities associated with use of these services, the systems or networks, or any violation of this AUP.

Revision date: August 12, 2025

Weiterempfehlen Über X teilen Über LinkedIn teilen Copying...