This Policy governs Clients’ and Users’ use of products and services provided by Provider under this Agreement that are detailed on Provider’s websites available at https://myjobhunter.ai/ and https://mypersonalmentors.com and reflected in the Client’s order (collectively, the “Services”) offered by My Personal Mentor Ltd. and our affiliate My Job Hunter Technologies LLC (“Provider”).
This Policy describes activities that are prohibited in connection with Clients’ and Users’ use of the Services, which may be updated from time to time.
Unless specified elsewhere in this Policy, the following terms shall have the meanings ascribed to them:
“Policy” means this Acceptable Use Policy, as amended from time to time.
“Client” means You or any corporation, governmental department, or agent of any of these who have purchased our Services under our Terms and Conditions or any other applicable agreements.
“Malicious Code” means viruses, worms, time bombs, Trojan horses, and other harmful or malicious code, files, scripts, agents, or programs.
“Terms and Conditions” means the commercial terms and conditions available at [https://mypersonalmentors.com/terms-conditions/] which govern the purchase and use of the Services and this Policy.
“User Data/Content” means all electronic data or information (i) uploaded by You in the process of using the Services; (ii) created as a result of additional inputs by You in the process of using the Services; and/or (iii) generated by the Services in the form of output data (i.e., reports) received by You.
“You” or “Your” means you, as an individual, as the end user of the Services.
You agree not to use, or to encourage, promote, facilitate, or instruct others to use the Services as follows:
(a) To license, sublicense, sell, resell, rent, lease, transfer, assign, distribute, time share, or otherwise commercially exploit or make the Services available to any third party who has not been authorized by the Client, as applicable, under the Terms and Conditions.
(a) To engage in, promote, or encourage activities in violation of any applicable law, regulation, governmental order, decree, or legal agreement;
(b) To violate, or encourage violation of the legal rights of others, including, but not limited to, infringing or misappropriating any intellectual property or proprietary right of another;
(c ) To use, upload, store, share, host, copy, distribute, display, publish, transmit, or send User Data/Content that is or may be deemed offensive, inflammatory, hateful, infringing, defamatory, discriminatory, obscene, threatening, libelous, abusive, invasive of privacy, harmful to others, objectionable, or otherwise unlawful or tortious material;
(d) Send or store Malicious Code (whether intentional or inadvertent);
(e) In a way that could harm the Service or impair anyone else’s use of the Services; and
(f) For any unlawful, invasive, defamatory, infringing, or fraudulent purpose.
(a) To access or probe (or attempt to access or probe) any network, computer, or communications system, software application, or network or computing device systems (each, a “System“) without authorization, including, but not limited to, breaches, vulnerability scans, or penetration testing;
(b) To disable, interfere with, or circumvent any aspect of the Services; and
(c ) To breach any security or authentication measures used by a System or the Services.
(a) To damage, disable, overburden, or impair the Services or a System;
(b) To store or transmit any User Data/Content that contains or is used to initiate a denial of service attack, software viruses, or other Malicious Code;
(c ) To monitor or crawl a System that impairs or disrupts the System being monitored or crawled;
(d) To interfere with the proper functioning of any System, including any deliberate attempt to overload a System by mail bombing, news bombing, broadcast attacks, or flooding techniques;
(e) To operate network services like open proxies, open mail relays, or open recursive domain name servers; and
(f) To disable, interfere with, abuse, disrupt, intercept, circumvent, or otherwise violate the security of the Services, or to avoid any use limitations placed on a System.
(a) To distribute or facilitate the distribution of unwanted, unsolicited, or harassing mass e-mails or other messages, promotions, advertising, or solicitations (“Spam“);
(b) To alter, forge, or obscure mail headers or assume a sender’s identity without permission; and
(c ) To collect replies to messages sent from another Internet service provider in violation of this Policy or the Internet service provider’s policies.
(a) In any application or in a manner where failure of the Services could lead to the death or serious bodily injury of any person, or severe physical or environmental damage.
Provider reserves the right, but does not assume the obligation, to monitor and investigate violations of this Policy or misuse of the Services. Failure to comply with or breach of this Policy constitutes a material breach of the terms and conditions upon which You are permitted to use the Services, and, at any time, may result in Provider taking any actions in its sole discretion, including with immediate effect based on Provider’s reasonable judgment, up to and including:
(a) warnings;
(b) suspending or terminating access to the Services;
(c ) removing, or prohibiting access to, or modifying content that violates this Policy or any agreement that Provider has with You for use of the Service; and/or
(d) legal proceedings against You for reimbursement of all costs on an indemnity basis (including, but not limited to, reasonable administrative and legal costs) resulting from the breach.
Without notice to You (unless required by law), Provider may report any activity that Provider suspects violates any law or regulation to appropriate law enforcement authorities, or regulators. Provider’s reporting may include disclosing Your account information and/or Your User Content/Data. Provider may also cooperate with law enforcement agencies or regulators to help with the investigation and prosecution of illegal conduct by providing information related to alleged violations of this Policy. Provider excludes and disclaims all liability for actions taken in response to breaches of this Policy. The responses described in this Policy are not limited, and Provider may take any other action it reasonably deems appropriate
If You become aware of any violation of this Policy, You must notify Provider immediately and reasonably cooperate in any efforts to stop or remedy the violation.
Want weekly job-hunt tips delivered to your inbox? With FREE templates and resources?
Join the MPM Family Newsletter, trusted by 105,000+ job seekers.
© 2026 · My Personal Mentors · All Rights Reserved