2. PROHIBITED USES
You may NOT use the platform for:
Any violation of local, state, federal, or international laws
Fraud, scams, or deceptive practices
Money laundering or financial crimes
Intellectual property infringement
Harassment, stalking, or threatening behavior
Identity theft or impersonation
Child exploitation or abuse
Drug trafficking or illegal substances
Terrorist activities or violent extremism
You may NOT use the platform for:
Conducting insurance business without proper licenses
Violating state insurance regulations or NAIC guidelines
Making false, misleading, or deceptive insurance claims
Using prohibited terms in insurance marketing (e.g., "free insurance," "no cost")
Twisting, churning, or other unethical insurance practices
Unlawful solicitation of insurance business
Impersonating insurance carriers or regulators
Selling insurance products you are not appointed to sell
2.3 Platform Abuse
You may NOT:
Share Accounts: Share login credentials with unauthorized users outside your organization
Resell Access: Resell or redistribute Mai Marketing Machine access without written authorization
White-Label Without Permission: Attempt to white-label or rebrand the platform
Competitive Intelligence: Use the platform to gather information for competing services
Resource Abuse:
Excessive API calls beyond 10 requests per second
Bulk data exports for non-business purposes
Automated scraping or data harvesting
Uploading files exceeding 100MB per file
Creating spam or bulk unsolicited communications
Security Violations:
Attempting to access other users' accounts or data
Circumventing security measures or authentication
Testing vulnerabilities or penetration testing without authorization
Installing malware, viruses, or harmful code
Denial of service attacks or similar disruptions
Reverse Engineering: Attempting to reverse engineer, decompile, or extract source code
2.4 Communication Violations
You may NOT use the platform to send:
Spam or unsolicited bulk communications
Malicious content or phishing attempts
Offensive, discriminatory, or hate speech
False or misleading information
Messages violating CAN-SPAM Act or TCPA
Pyramid schemes or multi-level marketing to unwilling recipients
Content promoting violence or self-harm
Sexually explicit or pornographic content
Communications designed to manipulate or deceive recipients
3. COMPLIANCE REQUIREMENTS
3.1 Insurance Regulations
State insurance licensing requirements
NAIC Model Regulations
State-specific insurance advertising rules
Carrier appointment and approval requirements
E&O insurance requirements
3.2 Federal Regulations
FTC Act and consumer protection laws
CAN-SPAM Act for email communications
TCPA for phone and text communications
Fair Credit Reporting Act (if applicable)
Americans with Disabilities Act (website accessibility)
3.3 Data Protection Laws
GDPR (if serving EU residents)
CCPA/CPRA (California residents)
Other state privacy laws (Virginia, Colorado, Connecticut, etc.)
Data breach notification requirements
Privacy policy and disclosure requirements
3.4 Advertising Standards
Truth in advertising principles
Required disclosures and disclaimers
Substantiation of claims
Clear and conspicuous disclosures
Avoidance of deceptive practices
4. RESOURCE LIMITS
4.1 Technical Limitations
API Rate Limit: 10 requests per second per account
File Upload Size: Maximum 100MB per file
Storage: No overall limit; reasonable use expected
Contacts/Leads: Unlimited
Users: Unlimited (within your subscription tier)
4.2 Communication Limits
Email Sending:
Volume limits based on sender reputation
Must comply with CAN-SPAM Act
Unsubscribe links required
No purchased or scraped email lists
SMS Messaging:
Must comply with TCPA
Prior express written consent required
Clear identification of sender
Easy opt-out mechanism
4.3 Reasonable Use
"Reasonable use" means:
Use consistent with typical insurance agency marketing needs
Not abusing resources to harm platform performance
Not causing disruption to other users
Using platform for intended business purposes only
5. SECURITY REQUIREMENTS
5.1 Account Security
You must:
Use strong, unique passwords (minimum 12 characters, mix of types)
Enable multi-factor authentication when available
Keep login credentials confidential
Not share accounts with unauthorized individuals
Use secure, private networks (no public Wi-Fi without VPN)
Keep your devices secured with antivirus/anti-malware
5.2 Access Management
You must:
Conduct regular access reviews (quarterly)
Immediately remove access for terminated employees
Assign appropriate permission levels (least privilege)
Monitor user activity for suspicious behavior
Maintain audit logs of sensitive data access
5.3 Incident Reporting
You must immediately report:
Suspected security breaches or unauthorized access
Lost or stolen devices with platform access
Compromised passwords or credentials
Phishing attempts targeting your account
Malware infections on devices accessing platform
Any suspicious activity or anomalies
Report To: [email protected] (mark URGENT for security incidents)
6. CONTENT STANDARDS
All marketing content created or distributed through the platform must:
Be truthful and not misleading
Include required insurance disclosures
Respect intellectual property rights (no copyright infringement)
Maintain professional standards
Comply with insurance advertising regulations
Avoid prohibited insurance terms and practices
Include clear identification of your agency
6.2 Prohibited Content
You may NOT create or distribute:
False or deceptive claims about insurance products
Guaranteed results or unrealistic expectations
Comparisons without proper substantiation
Content violating copyright or trademarks
Offensive or discriminatory material
Content promoting illegal activities
Misleading endorsements or testimonials
Content designed to manipulate or deceive
6.3 Intellectual Property
Respect all copyrights, trademarks, and IP rights
Obtain licenses for stock photos, music, videos
Do not copy competitors' content
Credit sources when required
Do not infringe on our intellectual property
7. MONITORING AND ENFORCEMENT
7.1 Monitoring Activities
We monitor platform usage for:
Policy compliance and violations
Security threats and suspicious activity
Resource abuse and performance issues
Spam and unauthorized communications
Quality and safety concerns
Monitoring Methods:
Automated alerts for unusual activity
Manual review of reported violations
User reports and complaints
Security system logs and analytics
Upon suspected violation:
Initial Assessment: Review available evidence and logs
User Notification: Email notification of suspected violation (except for severe violations)
Investigation: Gather additional information, may request explanation
Determination: Decision on whether violation occurred
Enforcement Action: Implement appropriate consequences
Appeal Option: User may appeal decision (see Section 7.5)
7.3 Enforcement Actions
First Violation (Minor):
Email warning with specific violation details
7-day correction period
Required acknowledgment of policy
Account note documenting violation
Second Violation (Minor):
Email warning
30-day probation period
Enhanced monitoring of account activity
Mandatory review of this policy
Account note documenting violation
Third Violation (Minor) OR First Major Violation:
7-day account suspension
Written notice of suspension and reason
Required corrective action plan
Review meeting before reinstatement
Final warning of potential termination
Fourth Violation OR Repeated Major Violations:
Permanent account termination
No refund for prepaid services
Data export provided (30-day window)
Permanent ban from services
Severe Violations - Immediate Termination Without Warning:
Fraud or illegal activity
Security breaches or hacking attempts
Egregious insurance violations
Threats or harassment
Malware distribution
Severe harm to other users or platform
7.4 Violation Categories
Minor Violations:
First-time copyright infringement
Accidental spam send
Minor security policy violation
Inadvertent resource overuse
Non-malicious technical violations
Major Violations:
Repeated minor violations
Intentional policy violations
Account sharing or reselling
Significant security violations
Insurance regulatory violations
Harmful content distribution
Severe Violations:
Illegal activities
Fraud or financial crimes
Security attacks or breaches
Egregious abuse harming others
Violations causing significant harm
Criminal conduct
7.5 Appeal Process
If you believe enforcement action was inappropriate:
Step 1: Email [email protected] within 7 days of action
Step 2: Provide:
Specific enforcement action being appealed
Reason you believe action was inappropriate
Supporting evidence or documentation
Corrective measures you have implemented
Step 3: Nathan Brodnax reviews appeal within 5 business days
Step 4: Appeal decision is final
Note: Severe violations (fraud, illegal activity) are generally not appealable.
8. VIOLATION REPORTING
8.1 How to Report Violations
If you witness or suspect policy violations by another user:
Email: [email protected]
Subject Line: "AUP Violation Report"
Include:
Description of suspected violation
Evidence (screenshots, emails, links)
Date and time of violation
Impact on you or others
Your contact information
Response Time: We acknowledge reports within 2 business days and investigate within 5 business days.
8.2 Anonymous Reporting
Anonymous reports are accepted but may be harder to investigate without follow-up information. Provide as much detail as possible.
8.3 False Reports
Knowingly filing false violation reports is itself a violation and may result in enforcement action against the reporter.
8.4 Protection from Retaliation
We prohibit retaliation against users who report violations in good faith. Retaliation is a severe violation subject to immediate termination.
9. MODIFICATIONS TO POLICY
We may update this Acceptable Use Policy at any time with 30 days notice via:
Email notification to all users
Prominent notice on platform
Pop-up notification upon login
Continued use after changes constitutes acceptance. Material changes that significantly restrict your use require explicit consent.
10. RELATIONSHIP TO OTHER POLICIES
This AUP supplements and incorporates by reference:
User Agreement
Privacy Policy
Terms of Service
Refund & Cancellation Policy
Data Processing Agreement
In case of conflict, the most restrictive provision applies.
11. THIRD-PARTY PLATFORM COMPLIANCE
As Mai Marketing Machine operates on GoHighLevel infrastructure, you must also comply with:
GoHighLevel Terms of Service
GoHighLevel Acceptable Use Policy
GoHighLevel Data Processing Agreement
Violations of GoHighLevel policies may result in platform suspension affecting all our users.
11.2 Third-Party Integration Compliance
When using integrated services (Google Ads, social media, etc.), you must comply with:
Google Ads policies and terms
Facebook/Instagram advertising policies
LinkedIn advertising policies
Email service provider terms
SMS carrier regulations
We are not responsible for third-party platform suspensions or violations.
12. LIABILITY AND INDEMNIFICATION
You are solely responsible for:
Your use of the platform
Content you create or distribute
Compliance with laws and regulations
Your marketing practices
Claims arising from your violations
You agree to indemnify and hold harmless Insight to Impact LLC, its officers, employees, and affiliates from:
Claims arising from your policy violations
Damages caused by your misconduct
Regulatory fines from your non-compliance
Third-party claims related to your content
Costs of investigating and responding to violations
We are not liable for:
Your violations of this policy
Third-party platform actions
Business losses from enforcement actions
Damages from other users' violations
Indirect or consequential damages
13. CONTACT INFORMATION
Policy Questions: [email protected]
Violation Reports: [email protected]
Security Incidents: [email protected] (mark URGENT)
Appeals: i[email protected]
Mailing Address:
Insight to Impact LLC DBA AiAi Mastermind
7131 Yorktown Ave. #1006
Huntington Beach, CA 92648
Phone: 878 788 8855
Response Times:
General inquiries: 48 business hours
Violation reports: 2 business days acknowledgment, 5 business days investigation
Security incidents: 4 hours during business hours
© 2024 AIAI Mastermind. All Right Reserved