Acceptable Use Policy
Last Updated: August 15, 2025
OVERVIEW
This Acceptable Use Policy (“AUP”) sets forth the rules and guidelines for using RevAssurance services, websites, and applications (collectively, the “Services”) provided by ERN Enterprises, Inc. (the “Provider”). It applies to all users of the Services, including but not limited to employees, contractors, agents, and customers. By using our Services, you agree to comply with this AUP in addition to our Terms and Conditions, Privacy Policy, and Product License Agreement.
SECTION 1 – PURPOSE
The purpose of this AUP is to ensure the responsible, legal, and respectful use of our Services, and to protect the security, integrity, and availability of our systems, customers, and partners.
SECTION 2 – DEFINITIONS
For purposes of this AUP:
- “Authorized User” means an individual who has been granted access to the Services by a Client pursuant to the Provider’s Terms and Conditions, Product License Agreement, or other written agreement.
- “Client” means the customer organization, business, or legal entity that has entered into an agreement with Provider for access to the Services.
- “Privacy or Security Breach” means any unauthorized access, use, disclosure, modification, or destruction of data, including Protected Health Information (PHI) or Personally Identifiable Information (PII), in violation of applicable law or this AUP.
- “Proprietary Content” means any template, form, layout, design, dataset, software code, user interface, intellectual property, or other material provided by Provider through the Services, excluding Customer Data.
- “Customer Data” means all information, including PHI, PII, and other content, that an Authorized User or Client inputs, uploads, or stores in the Services.
- “Tenant” means a logically separated instance of the Services designated for use by a Client and its Authorized Users.
- “PHI” means Protected Health Information, which is information that: (1) identifies the individual, or with respect to which there is a reasonable basis to believe the information can be used to identify the individual; (2) is oral or recorded in any form or medium; and (3) is created or received by Provider or its Services and relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual. “PHI” includes “Electronic Protected Health Information.” As used in this AUP, “PHI” includes but is not limited to PHI obtained through an electronic health records system.
All terms used in this AUP and not otherwise defined will have the same meaning set forth in the Terms and Conditions, Privacy Policy, and Product License Agreement.
SECTION 3 – USER ACCESS
- Users may only access the Services using their own assigned unique credentials.
- Account credentials, including passwords, must not be shared with any other individual for any reason.
- Authorized Users may not use another Authorized User’s credentials.
SECTION 4 – PROHIBITED ACTIVITIES
As an Authorized User or Client, you may not use the Services to:
Illegal or Harmful Activities
- Violate any applicable laws, regulations, or government orders.
- Engage in or promote any activities that involve fraud, deception, or other unethical conduct.
- Transmit, store, or distribute any material that is defamatory, obscene, harassing, or otherwise objectionable.
Security Violations
- Attempt unauthorized access to accounts, systems, or networks.
- Circumvent or interfere with authentication, security, or access controls.
- Introduce malware, viruses, Trojan horses, worms, or other harmful code.
- Attempt to access, view, or modify data belonging to another Tenant or Authorized User, except as explicitly permitted by the Provider.
Abuse of Resources
- Launch denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks.
- Engage in excessive automated requests that degrade performance of the Services.
- Use the Services in a way that could damage or overload our infrastructure or degrade performance for other Tenants.
Intellectual Property and Content Usage Restrictions
- Infringe upon or misappropriate Provider’s intellectual property rights.
- Infringe upon or misappropriate any third-party intellectual property rights.
- Use the Services to distribute pirated software, counterfeit goods, or copyrighted material without authorization.
- Input, upload, transmit, or otherwise expose Provider’s proprietary information, non-public data, or any content obtained through the Services to large language models (LLMs), generative artificial intelligence (AI) systems, or other machine learning (ML) algorithms without our prior written consent.
- Use automated systems to scrape, mine, copy, or otherwise extract any portion of the Services’ content, interface, or data for the purpose of building, training, or improving an AI or ML system, or for any competitive analysis.
- Reverse-engineer, decompile, disassemble, or attempt to derive the source code, algorithms, or underlying structure of the Services.
Unauthorized Integrations and Automated Tools
- Use the Services in any manner intended to avoid payment, licensing restrictions, or usage quotas.
- Use, install, or enable any third-party browser plugins, extensions, scripts, bots, or other software designed to interact with the Services, unless expressly permitted by Provider in writing. Permission may be requested by emailing support@revassurance.com
- Employ any automated tool, scraper, or data extraction technology to collect, copy, or otherwise obtain data from the Services.
- Use any third-party tool that could compromise account security, degrade performance for other users, circumvent usage limits, or expose our intellectual property to unauthorized parties, including for the purpose of training or improving AI or ML systems.
- Access the Services through any application or interface other than those provided or approved by Provider.
Use of Templates and Generated Content
- You may store, retain, and use completed documents, forms, or other generated content produced through the Services that incorporate your own data, including any protected health information (PHI) or other information you provide, for your business or legal purposes.
- You may not download, store, reproduce, or otherwise create a library of unmodified or blank templates, form layouts, or other proprietary content provided by the Services, nor use the Services in a way intended to circumvent our content generation process. All unmodified templates and proprietary content, whether displayed on-screen or downloadable, are the intellectual property of Provider and may not be retained outside of the Services without our prior written consent.
PHI Entry Restrictions
- Authorized Users may only enter Protected Health Information (PHI) into fields explicitly designated as “SECURE FORM” and wrapped in an orange border within the Services. Secure Forms are clearly marked with a bright orange border.
- Secure Forms are designed such that all data transmission and caching is disabled outside of the client-side generation process, allowing PHI to be safely used to generate downloadable content.
- Users must not enter PHI or other sensitive personal data into any other fields, pages, or areas of the Services. Entering PHI outside Secure Forms may result in immediate suspension of access and could constitute a Privacy or Security Breach under this AUP.
SECTION 5 – CUSTOMER RESPONSIBILITIES
As an Authorized User or Client, you are responsible for:
- Ensuring your use of the Services complies with all applicable laws, including the Health Insurance Portability and Accountability Act, this AUP, the Product License Agreement, Terms and Conditions, and Privacy Policy.
- Protecting the privacy, confidentiality, and security of the PHI and other information accessed from electronic health records systems in accordance with federal and state privacy laws and regulations;
- Protecting against authorized access to the Services and ensuring your account credentials are kept secure.
- Not sharing your account credentials with anyone for any reason.
- Immediately reporting suspected security breaches or policy violations to support@revassurance.com.
- Cooperating fully with Provider’s efforts to investigate and mitigate the harmful effects of any actual or suspected Privacy or Security Breach.
SECTION 6 – MONITORING AND ENFORCEMENT
The Provider may:
- Monitor use of the Services for compliance with this AUP.
- Investigate suspected violations and cooperate with law enforcement when required.
- Remove, disable, or restrict access to content that violates this AUP.
- Suspend or terminate accounts or their access rights for violations of this AUP.
SECTION 7 – CONSEQUENCES OF BREACH
In the event that Authorized User or Client is determined to have engaged in a Privacy or Security Breach, Provider reserves the right to pursue all remedies available under applicable laws, including seeking injunctive relief, which shall be made available without the need for the posting of a bond or other security.
Notification of Infringements
Upon identifying a potential infringement of this AUP, the Provider will notify the Client in writing. This notification will include a description of the alleged infringement, the specific provisions of the AUP that have been violated, and any evidence supporting the claim.
Timelines for Remediation
The Client will be given a period of ten (10) business days from the date of notification to address and rectify the alleged infringement. During this period, the Client and their Authorized Users must take all necessary actions to ensure compliance with the AUP and provide a written response to the Provider detailing the steps taken to remedy the situation.
Recourse for Suspensions or Terminations
If the Client and their Authorized Users fail to remedy the infringement within the specified timeline, the Provider reserves the right to suspend or terminate access to the Services for the Client and their Authorized Users. In the event of suspension or termination, the Client will be notified in writing, and the notification will include the reasons for the action taken and any conditions for reinstatement of access.
The Client may appeal the suspension or termination by submitting a written request for review to the Provider within five (5) business days of receiving the suspension or termination notice. The appeal must include any relevant information or documentation that supports the Client’s position. The Provider will review the appeal and provide a written decision within ten (10) business days of receiving the appeal. The decision of the Provider will be final and binding.
SECTION 8 – REPORTING VIOLATIONS
To report violations of this AUP, please contact:
Email: support@revassurance.com
Phone: (714) 995 – 6900 ext. 2873
Mail: 3535 Hyland Ave. Suite 130 Costa Mesa, CA 92626
SECTION 9 – CHANGES TO THIS POLICY
We may update this AUP from time to time. The most current version will always be posted on our website with a revised “Last Updated” date. Changes and clarifications take effect immediately upon posting unless otherwise stated. If we make material changes, we will provide notice on this page so you are aware of any new responsibilities or prohibitions.
Your continued use of the Services after changes become effective constitutes acceptance of the updated AUP. It is your responsibility to review the most current version, which is available at all times on this page. We reserve the right, at our sole discretion, to update, change, or replace any part of this AUP by posting updates to our website.