Pega Products and Services Acceptable Use Policy
This Acceptable Use Policy (the "AUP") sets forth certain requirements for your organization and your end users that use any Pega products or services (collectively referred to as the “Services”). We may revise this AUP from time to time to add or modify restrictions. Violating this AUP may result in suspension or termination of services. You agree not to use or misuse the Services to affect the confidentiality, integrity or availability of any computer, network, software application, communications systems or network device (each a “System”).
UNLAWFUL AND OTHER USES WHICH ARE NOT PERMITTED: using the Services for any illegal, harmful, fraudulent, infringing or offensive use, or to display or to store or transmit content or data that is illegal, harmful, fraudulent, infringing or offensive use, or to use the Services or display, store, or transmit content or data that is invasive of privacy, infringing, obscene, libelous, or that is otherwise unlawful or tortious, or to carry out infringing or unlawful activities. Activities which are prohibited (except when specifically allowed as part of an approved vulnerability test which adheres to the Vulnerability Testing Policy) include but are not limited to the following:
- accessing or using a System without permission including attempts to breach or otherwise circumvent any security or authentication measures. Also accessing or searching the Services by any means other than our publicly supported interfaces (for example, “scraping”);
- monitoring of data or traffic on a System without permission;
- forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision;
- accessing, tampering with, or using non-public areas or parts of the Services, or shared areas of the services where you are not authorized;
- maliciously interfering with, degrading the performance of, or disrupting any user, host, or network. Network abuse activities which are forbidden include but are not limited to: Denial of Service (“DOS”); or other activity with the intent to overload, flood, or spam any part of the Services;
- supplying content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots, or intentionally sending malware;
- monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled;
- interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques;
- operating network services like open proxies, open mail relays, or open recursive domain name servers;
- using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions;
- sending, distributing, publishing or facilitating the sending of unsolicited or unauthorized communications, promotions or advertisements, or spam;
- sending altered, deceptive or false source-identifying information, including "spoofing" or "phishing";
- collecting replies to messages sent from another service provider if those messages violate this AUP or the acceptable use policy of that provider;
- violating copyrights by copying service or interface to Services or permitting other individuals or entities to copy services;
- abusing the services in any manner that circumvents their intended use;
- selling the services or services account information via unauthorized channels including, but not limited to, providing unauthorized access to or use of activation instructions;
- using automated or other means to access the Services other than by using our official interface and/or APIs;
- supplying content that infringes or misappropriates the intellectual property or proprietary rights of others;
- engaging in any activities that are illegal, that violate the rights of others, or that may be harmful to others, our operations or reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming;
- supplying content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.
In addition, the following terms apply to the use of Services that incorporate or use Generative Artificial Intelligence (GenAI) technology
Use Restrictions:
You may not use, or assist others in using, the Services to:
- violate the intellectual property, privacy, or publicity rights of others, including through unauthorized tracking, monitoring, or identification;
- generate or disseminate content that depicts a person’s voice, likeness, or identity including unauthorized impersonation and non-consensual sexual imagery without appropriate consent or legal rights;
- circumvent or attempt to bypass safety filters and functionality, content moderation, or prompt models to act in a manner that violates our policies;
- incite violence, hatred, or discrimination against individuals or groups;
- disclose or misuse personal, confidential, or sensitive information without appropriate consent;
- create content that is psychologically or emotionally harmful;
- influence political campaigns or interfere with democratic processes;
- use for surveillance, censorship, or law enforcement without lawful authority;
- facilitate or promote self-harm or harm to others;
- generate or distribute hate speech or discriminatory content;
- harass, bully, intimidate, or abuse individuals or groups;
- misrepresent AI-generated content as human-created with the intent to deceive;
- generate or disseminate false, misleading, or deceptive information;
- develop or improve a similar or competing product or service, including to train competing GenAI models, except as expressly approved by Pega, or supporting any third party’s attempt at any of the conduct restricted in this sentence;
- for prohibited practices under the European Artificial Intelligence Act (EU AI Act); and
- for any use that would result in the Services being declared a high-risk system or that otherwise qualify as “high-risk” under the EU AI Act or applicable law or regulation.
Use of Pega GenAI.
- Pega GenAI utilizes prompts inputted by an end user. To use Pega GenAI, You must ensure prompts are appropriate and do not violate this Acceptable Use Policy or applicable agreement between you and Pega. You shall not, and shall ensure end users do not, override any protections put in place by Pegasystems.
- If You use Pega GenAI Connect to build custom functionality. You shall provide sufficient detail of such custom functionality to Pegasystems upon request to Pegasystems. If Pegasystems determines that such custom functionality is not an appropriate use of Pega GenAI, then You shall alter or no longer use such custom functionality. Pegasystems may limit or turn off access to Pega GenAI for any non-appropriate use in Pegasystems’ discretion.
- You shall be responsible for any use of Generative AI by You if such use involves an API key to access such Generative AI obtained by You.
Additional GenAI requirements include:
- Responsible AI Requirements. If you use the GenAI or machine learning Services to make consequential decisions, you must evaluate the potential risks of your use case and implement appropriate human oversight, testing, and other use case-specific safeguards to mitigate such risks. Consequential decisions include, but are not limited to, those impacting a person’s fundamental rights, health, or safety (e.g., medical diagnosis, judicial proceedings, access to critical benefits like housing or government benefits, opportunities like education, decisions to hire or terminate employees, or access to lending/credit, and providing legal, financial, or medical advice). (“AI/ML Services”) and compliance with this AUP upon request.
- You and your end users are responsible for all decisions made, advice given, actions taken, and failures to take action based on your use of AI/ML Services. AI/ML Services use machine learning models that generate predictions based on patterns in data. Output generated by a machine learning model is probabilistic, and generative AI may produce inaccurate or inappropriate content. Outputs should be evaluated for accuracy and appropriateness for your use case.
Pega has the right to investigate suspected violations of this AUP. In addition, Pega has the right to report suspected violations of this AUP to applicable law-enforcement authorities or third parties, and to cooperate with any investigation of illegal activities associated with use of these services, the systems or networks, or any violation of this AUP.
Revision date: May 30, 2025