Legal
Acceptable Use Policy
This policy defines permitted use of Kern services and restrictions required to protect platform integrity, customer safety, and legal compliance.
Permitted use
Kern may be used for lawful task orchestration, evidence evaluation, and operational verification workflows aligned with your contractual terms.
Prohibited activity
- • Illegal, deceptive, or abusive activity.
- • Attempts to bypass authentication, access controls, or rate limits.
- • Submission of malware, exploit payloads, or harmful automation.
- • Unauthorized collection or disclosure of sensitive personal data.
- • Interference with service reliability or other tenant operations.
API and credential handling
API keys must be protected and used only by authorized systems. Keys must not be embedded in public clients, exposed in source control, or shared outside approved teams.
Enforcement
Kern may rate-limit, suspend, or terminate access to address policy violations, security risk, or legal obligations.
Policy contact
Questions about acceptable use can be sent tolegal@kernprotocol.com.