JFrog Acceptable Use Policy
Last Updated: February 12, 2024
This Acceptable Use Policy (“Policy”) is a guideline designed to ensure the proper use of the products and services offered by JFrog and its affiliates (“Services”) and our website(s) including https://jfrog.com/ (“Site”). This Policy supplements, and is incorporated into the applicable JFrog terms and conditions currently available at https://jfrog.com/terms-and-conditions/.
JFrog may modify this Policy at any time by posting a revised version on the Site. By using the Services or accessing the Site, you agree to the latest version of this Policy.
Prohibited Activities. You may not use, attempt to use, or allow others to use the Services or the Site in any of the following ways:
- Violations of Laws. For any fraudulent activity or in violation of any laws.
- Violating Rights of Others. To violate the rights of others.
- Inappropriate Content. To publish or store content that constitutes child sexually exploitative material, or to threaten, incite, promote, or actively encourage violence, terrorism, or other serious harm.
- Service Disruption. To disrupt the experience of other JFrog users or interfere with the security or integrity of the Services or any other conduct that attempts to disable or overload the Services.
- Bypassing Service Limitations. To bypass, exploit, or disable limitations or restrictions placed on the Services.
- System Security. To compromise the security of the Services. This includes, but is not limited to, engaging in activities that disrupt, interfere with, or inhibit any other user from using and enjoying the Services. Hacking, spreading malware, bypassing security measures, or any other form of unauthorized access is strictly prohibited.
- Reverse Engineering. To reverse engineer, copy, disassemble, or decompile any part of the Services, or use any robot, spider, site search/retrieval application or other device to retrieve, index, “scrape,” or “data mine” any content from the Services.
- Falsification of Identity or Origin. To create a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.
Investigation and Reporting. Violations of this policy may result in temporary or permanent suspension of access to JFrog’s Services. You agree to cooperate with us to remedy any violation. JFrog may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties.