Acceptable Use Policy
Last Updated: July 22, 2019
This Acceptable Use Policy (“AUP”) is incorporated into the Terms of Use and the InfluxDB Cloud 2.0 Services Subscription Agreement between Customer and InfluxData (the “Agreement”), as the case may be.
Customer’s services may be suspended or terminated for violation of this AUP, as further specified in the Agreement. Capitalized terms used in this AUP have the meaning given in the Agreement.
A. Use of the Services
Customer may not:
- Interfere or attempt to interfere in any manner with the functionality or proper working of the Services;
- Upload to the Services or use the Services to store or transmit material in violation of third-party privacy rights;
- Upload Personal Data to the Services without InfluxData’s express prior written consent in each such instance.
- Upload to the Services, or use the Services to store or transmit any malware. Malware means programming (code, scripts, active content, and other software) that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, or other malicious or unwanted software or programs;
- Use or permit the use of the Service to send unsolicited mass mailings outside its organization. The term “unsolicited mass mailings” includes all statutory or common definitions or understanding of those terms in the applicable jurisdiction, including without limitation, those set forth for “Commercial Electronic Mail Messages” under the U.S. CAN-SPAM Act
- Interfere with or disrupt the integrity or performance of the Services or third-party data stored or processed with the Services or attempt to gain unauthorized access to the Services or their related systems or networks; or
- Attempt to probe, scan, penetrate or test the vulnerability of an InfluxData system or network, or to circumvent, avoid or breach InfluxData’s security or authentication measures, whether by passive or intrusive techniques, or by social engineering, without InfluxData’s express prior written consent.
B. Shared Resources
Customer may not use InfluxData systems, networks or technology in a way that unnecessarily interferes with their normal operation, or that consumes a disproportionate share of their resources. Customer agrees that InfluxData may quarantine or delete any data stored on InfluxData’s systems or networks if InfluxData reasonably believes that the data is infected with any malware, or is otherwise corrupted, and has the potential to infect or corrupt InfluxData systems, networks or technology or other customers’ data that is stored or accessed via InfluxData systems, networks or technology. Customer will comply with any written security or network access requirements that InfluxData provides to Customer in connection with its use of the Services.
C. Other Networks
Customer must comply with the rules of any other network its accesses or participates in when using the Services.
D. Abuse
Customer may not use InfluxData’s network or services to engage in, foster, or promote illegal, fraudulent, abusive, or irresponsible behavior, including:
- Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;
- Monitoring data or traffic on any network or system without the express authorization of the owner of the system or network;
- Interference with service to any user of the InfluxData or other network including mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
- Use of an Internet account or computer without the owner’s authorization;
- Collecting or using email addresses, screen names or other identifiers without the consent of the person identified (including, phishing, Internet scamming, password robbery, spidering, and harvesting);
- Collecting or using information without the consent of the owner of the information;
- Use of any false, misleading, or deceptive TCP-IP packet header information in an email or a newsgroup posting;
- Use of the Services to distribute software that covertly gathers information about a user or covertly transmits information about the user; or
- Any conduct that is likely to result in retaliation against the InfluxData network or website, or InfluxData’s employees, officers or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS).
- Avoiding System Restrictions. Using manual or electronic means to avoid or circumvent any use limitations placed on a system (including but not limited to network, computer, communication, software application, or device) or the Services.
E. Offensive Content
Customer may not publish, transmit or store on or via InfluxData’s network or equipment any content or links to any content that InfluxData reasonably believes:
- Is obscene;
- Contains harassing content or hate speech, or is violent, incites violence, or threatens violence;
- Is unfair or deceptive under the consumer protection laws of any jurisdiction;
- Is defamatory or violates a person’s privacy;
- Creates a risk to a person’s safety or health, creates a risk to public safety or health, is contrary to applicable law, or interferes with an investigation by law enforcement;
- Improperly exposes trade secrets or other confidential or proprietary information of another person;
- Is intended to assist others in defeating technical copyright protections;
- Infringes on another person’s copyright, trade or service mark, patent, or other property right, or violates any privacy right;
- Is illegal or solicits conduct that is illegal under laws applicable to you or to InfluxData; or
- Is otherwise malicious, fraudulent, or may result in retaliation against InfluxData by offended viewers or recipients.
F. Other
Customer will not be entitled to any credit or other compensation for any interruptions of service resulting from AUP violations.
Text on the right