You agree not to:
5.1. use the Services for any commercial use or purpose unless expressly permitted by AI Teacher in writing;
5.2. Rent, lease, loan, sell, resell, sublicense, distribute, or transfer licenses for any Services Content, except as permitted under Sections 3.3 (License Grant to Users) and 4 (Proprietary Content) of these Terms;
5.3. post, input, upload, generate, promote, or distribute any defamatory, discriminatory or libellous content;
5.4. Post, input, generate, promote, or distribute any content that is unlawful, offensive, obscene, harassing, threatening, hateful, discriminatory, misleading, harmful, or otherwise inappropriate;
5.5. use the Services in any manner that is harmful to children;
5.6. impersonate others, falsely claim affiliations, access accounts without permission, create accounts via bots, or engage in any fraudulent activity;
5.7. use the Services to commit any act of educational dishonesty including changing, substituting, replacing, altering or modifying in any way, the Services, the Downloadable Content or the Services Content and/or reproducing Imitation or copycat Services, Downloadable Content or Services Content and passing the same off as your own;
5.8. develop, support or use software, devices, scripts, robots, or any other means or processes (including crawlers, browser plugins and add-ons, or any other technology) to scrape the Services or otherwise copy lessons and other data from the Services;
5.9. Use bots or other automated methods to access the Services;
5.10. Use the Services for illegal purposes or in violation of any laws, including intellectual property and data protection laws;
5.11. interfere with or bypass security features, copy restrictions, or access non-public portions of the Services without authorization;
5.12. Reverse engineer, decompile, or attempt to discover the source code of the Services, except as allowed by law (and notify AI Teacher if doing so);
5.13. Intentionally disrupt or damage the operation of the Services or other users’ experience, including through denial-of-service attacks, prompt injections or spreading malicious code.