Acceptable Use Policy.
Effective February 25, 2024
Last updated February 2024
General Information.
This Acceptable Use Policy (AUP) is a part of the Software Services Agreement and governs the usage of products and services of Time Log or of any third party products and services subscribed to or obtained from Time Log (the Services). This AUP applies to all users, including but not limited to customers, employees, contractors, and third parties who access or utilize the Services. Failure to adhere to this AUP may result in immediate termination, legal action, and reporting the violation to appropriate law enforcement authorities, if necessary. Time Log may modify this AUP at any time without notice. All capitalized terms used in this AUP that are not otherwise defined herein shall have the meaning ascribed to them in the Software Services Agreement.
Here’s what we won’t allow:
Disruption
Compromising the integrity of our systems. This could include probing, scanning, or testing the vulnerability of any system or network that hosts the Services.
Tampering with, reverse-engineering, or hacking our services, circumventing any security or authentication measures, or attempting to gain unauthorized access to the services, related systems, networks, or data.
Modifying, disabling, or compromising the integrity or performance of the services or related systems, network or data.
Deciphering any transmissions to or from the servers running the Services.
Overwhelming or attempting to overwhelm the Company infrastructure by imposing an unreasonably large load on our systems that consume extraordinary resources (CPUs, memory, disk space, bandwidth, etc.) such as:
Using “robots,” “spiders,” “offline readers,” or other automated systems to send more request messages to our servers than a human could reasonably send in the same period of time by using a normal browser;
Going far beyond the use parameters for any given service as described in its corresponding documentation; and
Consuming an unreasonable amount of storage in a way that’s unrelated to the purposes for which the services were designed.
Wrongful activities
Misrepresentation of yourself, or disguising the origin of any content (including by “spoofing”, “phishing”, manipulating headers or other identifiers, impersonating anyone else, or falsely implying any sponsorship or association with Time Log or any third party).
Using the Services for any illegal purpose, or in violation of any laws (including without limitation data, privacy, and export control laws).
Accessing or searching any part of the services by any means other than our publicly supported interfaces (for example, “scraping”).
Inappropriate communications
Soliciting our users for commercial purposes, unless expressly permitted by Time Log.
Disparaging Time Log or its partners, vendors, or affiliates.