Skip to content
logo
logo
Products
INFLUXDB 3 PRODUCTS

Self-Managed

InfluxDB 3 Enterprise NEW
InfluxDB Core (OSS) NEW

Telegraf

Telegraf Enterprise NEW
Telegraf (OSS)

Fully Managed

InfluxDB Cloud Serverless
InfluxDB Cloud Dedicated
RESOURCES

icon Platform Overview
icon Client Libraries
icon Explore All Integrations
Use Cases
USE CASES

Network & Infrastructure Monitoring
IoT Analytics & Predictive Maintenance
Machine Learning & AI
Modern Data Historian
Explore All
INDUSTRIES

Manufacturing & IIoT
Aerospace
Energy & Utilities
Financial Services
Telecommunications
Explore All
icon Siemens Energy Scales Global BESS Operations
See How
Developers

LEARN

Developer Resources
Blog
Webinars
Customers
Support
Partners

BUILD

Downloads Hub
Documentation
Integrations
AWS
CONNECT

InfluxDB University
Community
Live Events and Training

LATEST RELEASES

Get the latest InfluxDB 3 product updates, features

Learn More
Pricing
Contact Us
Sign In
Log in to InfluxDB Cloud 2.0
or Cloud Serverless
arrow
Log in to InfluxDB Enterprise 1.x arrow
Log in to InfluxDB Cloud 1.x arrow
Start Now
Products

INFLUXDB 3 PRODUCTS

Self-Managed

InfluxDB 3 Enterprise NEW
InfluxDB 3 Core (OSS) NEW

Fully Managed

InfluxDB Cloud Serverless
InfluxDB Cloud Dedicated

Telegraf

Telegraf Enterprise NEW
Telegraf (OSS)

RESOURCES

icon Platform Overview
icon Client Libraries
icon Explore All Integrations
Use Cases

USE CASES

Network & Infrastructure Monitoring
IoT Analytics & Predictive Maintenance
Machine Learning & AI
Modern Data Historian

INDUSTRIES

Manufacturing & IIoT
Aerospace
Energy & Utilities
Financial Services
Telecommunications
Explore All

Siemens Energy Scales Global BESS Operations

See How
Developers

LEARN

Developer Resources
Blog
Webinars
Customers
Support
Partners

BUILD

Downloads Hub
Documentation
Integrations
AWS

CONNECT

InfluxDB University
Community
Live Events and Training

LATEST RELEASES

Get the latest InfluxDB 3 product updates, features

Learn More
Pricing
Start Now
Sign In
Log in to InfluxDB Cloud 2.0
or Cloud Serverless
arrow
Log in to InfluxDB Enterprise arrow
Log in to InfluxDB Cloud 1.x arrow
Contact Us

Acceptable Use Policy

Last Updated: July 22, 2019

This Acceptable Use Policy (“AUP”) is incorporated into the Terms of Use and the InfluxDB Cloud 2.0 Services Subscription Agreement between Customer and InfluxData (the “Agreement”), as the case may be.

Customer’s services may be suspended or terminated for violation of this AUP, as further specified in the Agreement. Capitalized terms used in this AUP have the meaning given in the Agreement.

A.  Use of the Services

Customer may not:

  • Interfere or attempt to interfere in any manner with the functionality or proper working of the Services;
  • Upload to the Services or use the Services to store or transmit material in violation of third-party privacy rights;
  • Upload Personal Data to the Services without InfluxData’s express prior written consent in each such instance.
  • Upload to the Services, or use the Services to store or transmit any malware. Malware means programming (code, scripts, active content, and other software) that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, or other malicious or unwanted software or programs;
  • Use or permit the use of the Service to send unsolicited mass mailings outside its organization. The term “unsolicited mass mailings” includes all statutory or common definitions or understanding of those terms in the applicable jurisdiction, including without limitation, those set forth for “Commercial Electronic Mail Messages” under the U.S. CAN-SPAM Act
  • Interfere with or disrupt the integrity or performance of the Services or third-party data stored or processed with the Services or attempt to gain unauthorized access to the Services or their related systems or networks; or
  • Attempt to probe, scan, penetrate or test the vulnerability of an InfluxData system or network, or to circumvent, avoid or breach InfluxData’s security or authentication measures, whether by passive or intrusive techniques, or by social engineering, without InfluxData’s express prior written consent.

B.  Shared Resources

Customer may not use InfluxData systems, networks or technology in a way that unnecessarily interferes with their normal operation, or that consumes a disproportionate share of their resources. Customer agrees that InfluxData may quarantine or delete any data stored on InfluxData’s systems or networks if InfluxData reasonably believes that the data is infected with any malware, or is otherwise corrupted, and has the potential to infect or corrupt InfluxData systems, networks or technology or other customers’ data that is stored or accessed via InfluxData systems, networks or technology. Customer will comply with any written security or network access requirements that InfluxData provides to Customer in connection with its use of the Services.

C.  Other Networks

Customer must comply with the rules of any other network its accesses or participates in when using the Services.

D.  Abuse

Customer may not use InfluxData’s network or services to engage in, foster, or promote illegal, fraudulent, abusive, or irresponsible behavior, including:

  • Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;
  • Monitoring data or traffic on any network or system without the express authorization of the owner of the system or network;
  • Interference with service to any user of the InfluxData or other network including mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
  • Use of an Internet account or computer without the owner’s authorization;
  • Collecting or using email addresses, screen names or other identifiers without the consent of the person identified (including, phishing, Internet scamming, password robbery, spidering, and harvesting);
  • Collecting or using information without the consent of the owner of the information;
  • Use of any false, misleading, or deceptive TCP-IP packet header information in an email or a newsgroup posting;
  • Use of the Services to distribute software that covertly gathers information about a user or covertly transmits information about the user; or
  • Any conduct that is likely to result in retaliation against the InfluxData network or website, or InfluxData’s employees, officers or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS).
  • Avoiding System Restrictions. Using manual or electronic means to avoid or circumvent any use limitations placed on a system (including but not limited to network, computer, communication, software application, or device) or the Services.

E.  Offensive Content

Customer may not publish, transmit or store on or via InfluxData’s network or equipment any content or links to any content that InfluxData reasonably believes:

  • Is obscene;
  • Contains harassing content or hate speech, or is violent, incites violence, or threatens violence;
  • Is unfair or deceptive under the consumer protection laws of any jurisdiction;
  • Is defamatory or violates a person’s privacy;
  • Creates a risk to a person’s safety or health, creates a risk to public safety or health, is contrary to applicable law, or interferes with an investigation by law enforcement;
  • Improperly exposes trade secrets or other confidential or proprietary information of another person;
  • Is intended to assist others in defeating technical copyright protections;
  • Infringes on another person’s copyright, trade or service mark, patent, or other property right, or violates any privacy right;
  • Is illegal or solicits conduct that is illegal under laws applicable to you or to InfluxData; or
  • Is otherwise malicious, fraudulent, or may result in retaliation against InfluxData by offended viewers or recipients.

F.  Other

Customer will not be entitled to any credit or other compensation for any interruptions of service resulting from AUP violations.

Text on the right

InfluxData logo
Product & Solutions
  • InfluxDB
  • InfluxDB 3 Enterprise
  • InfluxDB Cloud Serverless
  • InfluxDB Cloud Dedicated
  • Telegraf Enterprise
  • Integrations
  • Data Lake / Warehouse
  • Data Collector
  • Pricing
  • Use Cases
  • Time Series Data
  • Time Series Database
  • Time Series Forecasting
  • Data Warehousing
  • Network Monitoring
Developers
  • Guides
  • Blog
  • Customers
  • Support
  • Webinars
  • Documentation
  • Events & Live Training
  • InfluxDB University
  • Community
  • InfluxDB 3 Core (OSS)
  • Telegraf
  • AWS
  • Product Integrations
  • Telegraf Inputs
  • Telegraf Outputs
  • Glossary
Company
  • About
  • Careers
  • Partners
  • Newsroom
  • Contact Us
  • Customers

548 Market St, PMB 77953
San Francisco, California 94104

Follow Us
twitter

© 2026 InfluxData Inc. All Rights Reserved.

Legal Security Cookie Policy Comparison