Becki
Home Privacy Terms

Acceptable Use Policy

Last updated: May 2, 2026

This Acceptable Use Policy ("AUP") describes prohibited uses of Becki and your obligations as a user. The AUP is part of and incorporated into the Terms of Service; violations may result in suspension or termination of your account.

1. Recording consent — your responsibility

Becki captures audio when you tell it to. It does not announce itself to other meeting participants. You — not Becki — are responsible for obtaining the legally required consent from every participant in any meeting you record.

1.1 Why this matters

Recording laws vary widely by jurisdiction, and many require all-party consent rather than just the consent of the person doing the recording. Examples of all-party-consent jurisdictions include (this list is not exhaustive and not legal advice):

  • United States, all-party-consent states: California, Connecticut, Delaware, Florida, Hawaii (with conditions), Illinois, Maryland, Massachusetts, Michigan, Montana, Nevada, New Hampshire, Oregon (in-person), Pennsylvania, Vermont (case law), Washington.
  • Outside the U.S.: Most EU member states, the United Kingdom, Canada (mixed by province), Australia (mixed by state), and many others impose consent or notification requirements.

Some jurisdictions distinguish between in-person and electronic communications, between business and personal contexts, or between recording and merely intercepting. Consult a qualified attorney for guidance specific to your situation. Failure to obtain required consent may expose you to civil and criminal liability under wiretapping, surveillance, or privacy statutes.

1.2 What we expect of you

Before using Becki to record any meeting, you agree to:

  • Identify the consent rule applicable to every participant's jurisdiction — not just yours.
  • Obtain that consent in advance, in a manner that satisfies applicable law (verbal acknowledgment, written agreement, calendar-invite disclosure, or whatever your jurisdiction requires).
  • Not rely on Becki to announce recording. The Software does not display itself to other participants. If your jurisdiction requires participants to be notified that recording is in progress, you must do so yourself.
  • Stop recording promptly if any participant withdraws consent.
  • Honor any participant's request to delete the recording, transcript, or extracted memory derived from a meeting they attended.

1.3 Recordings of children

You may not use Becki to record meetings primarily involving minors (under 18 in most jurisdictions; under 16 for our age policy) without the consent of a parent or legal guardian, in addition to any other consent required by law.

1.4 Sensitive contexts

Do not use Becki to record:

  • Conversations protected by attorney-client, doctor-patient, or other legally-recognized privilege, unless every privilege-holder has given informed consent.
  • Conversations covered by HIPAA (protected health information) without the safeguards required for a Business Associate relationship — Becki has not signed a Business Associate Agreement and is not intended for HIPAA-covered uses.
  • Conversations subject to similar sectoral laws (FERPA, GLBA, PCI-DSS, etc.) without ensuring that your use of Becki complies with them.

2. Content restrictions

You may not use the Service to ingest, process, store, or generate content that:

  • Is unlawful, infringes any third-party rights (copyright, trademark, trade secret, publicity, privacy), defames any person, or is otherwise tortious.
  • Constitutes child sexual abuse material (CSAM), promotes or facilitates harm to minors, or sexually exploits any person.
  • Threatens, harasses, stalks, doxes, or incites violence against any person or group.
  • Promotes or facilitates terrorism, mass violence, or organized criminal activity.
  • Contains malware, ransomware, viruses, or any other malicious code.
  • Constitutes regulated material (controlled substances, weapons, classified information) without all required authorizations.
  • Is generated specifically to evade content moderation, abuse-reporting systems, or rate limits at the underlying AI providers.

3. Service abuse

You may not, and may not enable any third party or AI agent to:

  • Probe, scan, penetration-test, or otherwise attempt to compromise the Service or any related infrastructure (Supabase, Anthropic, Voyage, Fly.io), except through a security disclosure program with prior written authorization.
  • Interfere with or disrupt the integrity or performance of the Service or its servers, including via excessive automated requests, denial-of-service, or rate-limit-evasion patterns.
  • Access the Service through any interface other than the published applications and API endpoints.
  • Reverse-engineer, decompile, or disassemble the Software except to the extent permitted by applicable law.
  • Resell, sublicense, white-label, or redistribute the Service or any of its outputs as a substantially similar service to third parties.
  • Use the Service to develop a competing product or service, or to extract content for the purpose of training a third-party AI model.
  • Use the Service in violation of any rate limits, usage caps, or fair-use guidelines we communicate.

4. AI provider terms apply downstream

When you use the Service, your activity is also subject to the usage policies of the AI providers Becki invokes:

  • Anthropic Usage Policies: www.anthropic.com/legal/aup
  • Voyage AI Terms of Service: www.voyageai.com/terms

A violation of any downstream provider's policies (including their content rules, prohibited-use policies, or safety policies) is also a violation of this AUP. Becki may suspend access to specific features or to the entire Service if a downstream provider revokes access for reasons attributable to your use.

5. Account hygiene

  • One person, one account. You may not create multiple accounts to evade rate limits, suspensions, or pricing.
  • Do not share your credentials. If you need shared access for an organization, contact us about future team plans.
  • Use a real, working email address you control.
  • Notify security@becki.io immediately if you suspect unauthorized access.

6. AI tools you connect via MCP

When you install Becki's MCP server into an AI tool (Claude Code, Cursor, Zed, etc.), that tool acts on your behalf with your authentication. You are responsible for:

  • Ensuring the AI tools you connect are trustworthy and used in compliance with this AUP.
  • The conduct of any AI tool you authorize to read or write your vault, including its prompts, tool calls, and any content it ingests on your behalf.
  • Monitoring vault activity if you connect tools that operate autonomously.

7. Reporting violations

Suspected violations of this AUP — by another user, by an AI agent acting against the Service, or otherwise — should be reported to abuse@becki.io with as much detail as possible. We investigate reports in good faith.

8. Enforcement

Becki may, with or without notice and at its sole discretion, take any of the following actions in response to a violation or suspected violation of this AUP:

  • Issue a warning or request remediation.
  • Suspend specific features (e.g., AI generation, sync, MCP access) while we investigate.
  • Suspend or terminate your account.
  • Remove or refuse to retain content that violates this AUP, to the extent we control it (server-side; we cannot remove content from your local device).
  • Cooperate with law enforcement or other authorities as required by valid legal process.
  • Pursue any other remedies available to Becki under contract or applicable law.

For severe violations (CSAM, threats of imminent violence, ongoing security attacks), we reserve the right to act immediately and without prior notice.

9. Changes

We may update this AUP from time to time. For material changes, we will notify you via the app or email. Your continued use of the Service after the new AUP takes effect constitutes acceptance.

10. Contact

Acceptable use questions or to report a violation: abuse@becki.io. Privacy questions: privacy@becki.io. Security disclosures: security@becki.io.

© 2026 Becki. All rights reserved.
Privacy Terms EULA Acceptable Use Subprocessors Contact