Acceptable Use Policy

Guidelines for responsible and lawful use of k&z quantum AI infrastructure, ensuring the security and integrity of our platform for all users.

Effective Date: January 1, 2026 — Version: 1.0

1. Introduction

This Acceptable Use Policy (“AUP”) establishes the rules and guidelines governing your use of the k&z quantum AI infrastructure platform, APIs, quantum processing units (QPUs), hybrid computing environments, and all related services (collectively, the “Services”). This AUP is incorporated by reference into the k&z Terms of Service and any applicable Master Service Agreement.

The purpose of this AUP is to protect the security, integrity, and availability of the k&z platform and to ensure that all users can benefit from reliable quantum computing resources. By accessing or using the Services, you agree to comply with this AUP. k&z reserves the right to update this AUP at any time, and your continued use of the Services after any such update constitutes acceptance of the revised policy.

2. Permitted Uses

2.1 General Permitted Uses

The Services are designed to support lawful quantum computing, quantum-classical hybrid computing, and related research and commercial activities. Permitted uses include, but are not limited to:

  • Quantum algorithm research, development, and benchmarking;
  • Quantum simulation of physical, chemical, and biological systems;
  • Optimization workloads, including combinatorial optimization, portfolio optimization, and logistics;
  • Quantum machine learning and quantum-enhanced artificial intelligence research;
  • Cryptographic research, including post-quantum cryptography development and testing;
  • Quantum error correction research and fault-tolerant computing experiments;
  • Academic research and educational activities related to quantum computing;
  • Commercial applications of quantum computing within the boundaries of applicable law;
  • Hybrid quantum-classical workloads that leverage both QPU and HPC resources; and
  • Software development and testing using k&z APIs and SDKs.

2.2 Responsible Use

Users are expected to use the Services responsibly and in a manner that does not negatively impact other users or the k&z platform. This includes efficient use of QPU resources, adherence to fair scheduling practices, and responsible consumption of shared computing capacity.

3. Prohibited Activities

3.1 Illegal Activities

You shall not use the Services for any activity that is illegal under applicable local, national, or international law. Prohibited illegal activities include, but are not limited to:

  • Conducting or facilitating fraud, money laundering, or terrorist financing;
  • Distributing, transmitting, or storing material that violates applicable law, including child exploitation material, illegal gambling content, or materials that incite violence;
  • Violating export control laws, sanctions, or embargo regulations (see our Export Controls & Sanctions Compliance page);
  • Engaging in activities that violate the privacy or data protection rights of individuals; and
  • Any other activity that would constitute a criminal offense or give rise to civil liability under applicable law.

3.2 Cryptographic Attacks on Third Parties

You shall not use the Services to:

  • Conduct cryptographic attacks against third-party systems, networks, or data, including attempts to break encryption, crack passwords, or factor cryptographic keys protecting systems you do not own or have explicit authorization to test;
  • Develop, test, or deploy tools designed to exploit vulnerabilities in cryptographic protocols used by third parties without their explicit written consent;
  • Attempt to use quantum computing resources to decrypt communications, data, or credentials belonging to third parties; or
  • Engage in “harvest now, decrypt later” schemes targeting third-party encrypted data.

Exception: Authorized cryptographic research conducted in controlled environments with proper ethical oversight, academic peer review, or under contract with the system owner is permitted, provided the results are handled responsibly and in accordance with responsible disclosure practices.

3.3 Unauthorized Access

You shall not:

  • Attempt to gain unauthorized access to any QPU resources, control systems, calibration interfaces, cryogenic infrastructure, or network segments not allocated to your account;
  • Access, tamper with, or use another user’s account, data, quantum circuits, or computational results without authorization;
  • Probe, scan, or test the vulnerability of the k&z platform or any associated systems or networks, unless expressly authorized by k&z in writing under our Responsible Disclosure program;
  • Attempt to bypass or circumvent any authentication, authorization, or security mechanisms, including multi-factor authentication, API rate limits, or resource quotas;
  • Use forged, spoofed, or fraudulent credentials to access the Services; or
  • Exploit software vulnerabilities, misconfigurations, or hardware flaws in quantum or classical computing infrastructure.

3.4 Resource Abuse

You shall not:

  • Consume QPU resources significantly in excess of your allocated capacity or in a manner designed to prevent other users from accessing shared resources;
  • Submit workloads designed to destabilize QPU calibration, induce excessive qubit decoherence, or degrade the performance of quantum hardware;
  • Use automated systems, bots, or scripts to monopolize QPU scheduling queues or circumvent fair-use scheduling mechanisms;
  • Engage in resource hoarding by reserving capacity with no intent to use it for productive purposes;
  • Submit intentionally malformed quantum circuits, excessively deep circuits, or workloads designed to stress-test hardware beyond its operational specifications without prior written authorization from k&z;
  • Use the Services for cryptocurrency mining or proof-of-work computations; or
  • Resell, redistribute, or sublicense access to QPU resources or the Services without the prior written consent of k&z.

3.5 Intellectual Property Violations

You shall not use the Services to infringe, misappropriate, or violate the intellectual property rights of any third party, including patents, copyrights, trademarks, and trade secrets. You shall not reverse engineer, decompile, or disassemble any component of the k&z platform or Services.

3.6 Harmful Content and Activities

You shall not use the Services to:

  • Develop, deploy, or distribute malware, viruses, worms, ransomware, or other malicious code;
  • Conduct denial-of-service attacks against any system or network;
  • Send unsolicited bulk communications (spam) or engage in phishing activities;
  • Develop weapons of mass destruction or components thereof; or
  • Engage in any activity intended to cause harm to individuals, organizations, or critical infrastructure.

4. Monitoring and Enforcement

4.1 Monitoring

k&z reserves the right to monitor the use of the Services to ensure compliance with this AUP, protect the security and integrity of the platform, and comply with applicable legal obligations. Monitoring may include, but is not limited to:

  • Automated analysis of resource consumption patterns, QPU scheduling behavior, and API usage;
  • Review of system logs, access logs, and network traffic metadata;
  • Anomaly detection for unusual workload patterns that may indicate resource abuse or security threats;
  • Periodic audits of account activity and usage metrics; and
  • Investigation of reports of suspected violations from users or third parties.

k&z does not routinely inspect the content of Client Data, including quantum circuit definitions or computational results. However, k&z may access Client Data when reasonably necessary to: (a) respond to security incidents; (b) comply with legal obligations; (c) investigate suspected violations of this AUP; or (d) provide technical support at the user’s request.

4.2 Reporting Violations

If you become aware of any violation of this AUP, you are encouraged to report it to k&z at support@kandz.co. Reports should include sufficient detail to enable investigation, including the nature of the violation, the date and time of occurrence, and any supporting evidence.

5. Consequences of Violation

5.1 Graduated Enforcement

k&z employs a graduated approach to enforcement, with the response proportionate to the severity of the violation. Enforcement actions may include:

  • Warning: A written notice identifying the violation and requesting corrective action within a specified timeframe.
  • Throttling: Temporary reduction of resource allocations or API rate limits to mitigate ongoing resource abuse.
  • Suspension: Temporary suspension of access to the Services, in whole or in part, pending investigation and resolution of the violation.
  • Termination: Permanent termination of the user’s account and all access to the Services.
  • Legal Action: Pursuit of civil or criminal remedies as permitted by applicable law.

5.2 Immediate Action

k&z reserves the right to take immediate action, including suspension or termination without prior notice, in cases of severe violations that: (a) pose an imminent threat to the security or integrity of the platform; (b) may cause harm to other users or third parties; (c) involve illegal activity; or (d) are required by law enforcement or court order.

5.3 No Liability

k&z shall not be liable for any damages, losses, or expenses incurred by the user as a result of enforcement actions taken in good faith under this AUP. Users remain responsible for all fees incurred prior to suspension or termination.

5.4 Appeals

Users who believe that enforcement action has been taken in error may submit a written appeal to support@kandz.co within fourteen (14) days of receiving notice of the enforcement action. k&z shall review the appeal and provide a written response within thirty (30) days. The decision on appeal shall be final.

6. User Responsibilities

6.1 Compliance

You are responsible for ensuring that your use of the Services, including all activities conducted under your account by your employees, contractors, and authorized users, complies with this AUP and all applicable laws and regulations.

6.2 Security

You are responsible for maintaining the security of your account credentials, API keys, and access tokens. You shall implement appropriate security measures to prevent unauthorized use of your account and shall promptly notify k&z of any security breach or suspected compromise.

6.3 Cooperation

You agree to cooperate with k&z in the investigation of suspected violations of this AUP and to provide information reasonably requested by k&z to facilitate such investigations.

7. Quantum-Specific Provisions

7.1 QPU Resource Stewardship

Quantum computing hardware is a shared and scarce resource. Users are expected to be responsible stewards of QPU resources by: (a) optimizing quantum circuits for efficient execution; (b) using simulators for initial testing before submitting workloads to QPU hardware; (c) releasing reserved capacity that is no longer needed; and (d) following published best practices for workload submission and scheduling.

7.2 Calibration Integrity

Users shall not intentionally submit workloads designed to interfere with or degrade QPU calibration cycles. k&z reserves the right to reject or deprioritize workloads that are determined to have a negative impact on QPU calibration or performance for other users.

7.3 Dual-Use Research

Users conducting research that may have dual-use implications (research with both beneficial and potentially harmful applications) are encouraged to consult with k&z’s compliance team before submitting such workloads. k&z reserves the right to require additional documentation, including ethics board approvals or institutional review board (IRB) certifications, for dual-use research activities.

8. Contact Information

If you have questions about this Acceptable Use Policy or wish to report a violation, please contact us:

  • AUP Inquiries: support@kandz.co
  • Abuse Reports: support@kandz.co
  • Security Issues: support@kandz.co
  • General Legal: support@kandz.co