LogRocket Acceptable Use Policy

Use of the Services is subject to this Acceptable Use Policy.

Capitalized terms have the meaning stated in the applicable agreement between Customer and LogRocket.

Customer agrees not to, and not to allow third parties to use the Services:

  • to violate, or encourage the violation of, the legal rights of others (for example, this may include allowing Customer End Users to infringe or misappropriate the intellectual property rights of others in violation of the Digital Millennium Copyright Act);
  • in any manner that does not comply with applicable law or in connection with any violation of applicable law (including engaging in, promoting or encouraging illegal activity);
  • for any unlawful, invasive, infringing, defamatory or fraudulent purpose (for example, this may include phishing, creating a pyramid scheme or mirroring a website);
  • to intentionally distribute viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature;
  • to interfere with the use of the Services, or the equipment used to provide the Services, by customers, authorized resellers, or other authorized users;
  • to disable, interfere with or circumvent any aspect of the Services;
  • without obtaining any necessary and appropriate end user consents that may be required by applicable law in the jurisdictions that Customer operates in
  • to generate, distribute, publish or facilitate unsolicited mass email, promotions, advertisings or other solicitations (“spam”); or
  • to use the Services, or any interfaces provided with the Services, to access any other LogRocket product or service in a manner that violates the terms of service of such other LogRocket product or service.
  • to upload to the Services or otherwise cause the Services to ingest “Sensitive Data”, which means any information that: (a) requires a high degree of protection by law and where loss or unauthorized disclosure would require notification by Customer to government agencies, individuals or law enforcement, (b) any information that, if made public, could expose individuals to a risk of physical harm, fraud, or identity theft. Sensitive Data includes, but is not limited to, social security numbers or other government-issued identification numbers, financial account numbers, credit card or debit card numbers, CVVs, credit report information or other personal financial information, health or medical information or other information that is subject to international, federal, state, or local laws or ordinances now or hereafter enacted regarding data protection or privacy, including, but not limited to, the Health Insurance Portability and Accountability Act, the Health Information Technology for Economic and Clinical Health Act, the Fair Credit Reporting Act, the Children’s Online Privacy Protection Act and the Gramm-Leach-Bliley Act