Acceptable UsePolicy
Our Acceptable Use Policy outlines the rules and guidelines for using UptimeMatrix. By using our Service, you agree to comply with these policies.
Key Principles
Fundamental principles that guide acceptable use of our Service
Respectful Use
Use our Service responsibly and ethically
Legal Compliance
Follow all applicable laws and regulations
Respect Others
Do not harm or interfere with others
Security First
Protect your account and our systems
Acceptable Uses
Examples of appropriate and permitted uses of our Service
Website Monitoring
Monitor websites and services you own or have explicit permission to monitor
Infrastructure Monitoring
Monitor your own servers, APIs, and infrastructure components
Business Operations
Use the Service for legitimate business and operational purposes
Compliance & Security
Monitor for security threats, compliance requirements, and uptime tracking
Prohibited Uses
The following activities are strictly prohibited and may result in immediate account termination
Illegal Activities
- Violating any applicable local, state, national, or international law
- Engaging in fraud, theft, or other criminal activities
- Infringing on intellectual property rights
- Distributing illegal content or materials
- Engaging in money laundering or financial crimes
Harmful Content
- Transmitting viruses, malware, or malicious code
- Distributing spam, phishing, or scam content
- Hosting or distributing harmful or offensive content
- Engaging in harassment, bullying, or threats
- Promoting violence, hate speech, or discrimination
Service Abuse
- Attempting to overload or disrupt our Service
- Using automated tools to abuse our systems
- Circumventing security measures or access controls
- Reverse engineering or decompiling our software
- Creating multiple accounts to evade restrictions
Unauthorized Access
- Attempting to gain unauthorized access to systems
- Accessing accounts or data without permission
- Exploiting security vulnerabilities
- Interfering with other users' accounts or data
- Bypassing authentication or authorization mechanisms
Monitoring Restrictions
- Monitoring websites or services you do not own
- Monitoring without proper authorization or consent
- Using monitoring data for malicious purposes
- Violating terms of service of monitored services
- Engaging in competitive intelligence gathering
Resource Abuse
- Excessive use of system resources
- Creating an unreasonable load on our infrastructure
- Using the Service for cryptocurrency mining
- Running resource-intensive automated processes
- Abusing API rate limits or quotas
Enforcement Process
How we detect and respond to policy violations
Monitoring
We continuously monitor Service usage to detect violations
Warning
First-time violations may result in a warning and request to correct behavior
Suspension
Repeated violations may result in temporary account suspension
Termination
Severe violations result in immediate account termination without refund
Violation Consequences
Actions we may take based on the severity of the violation
Warning
Written warning and request to correct behavior
Suspension
Temporary suspension of account access (1-30 days)
Termination
Permanent account termination without refund
Legal Action
Referral to law enforcement or legal proceedings
Monitoring & Detection
How we monitor Service usage and detect violations
Automated Monitoring
We use automated systems to continuously monitor Service usage, including API calls, account activity, monitoring patterns, and resource consumption. These systems analyze behavior patterns to detect potential policy violations.
User Reports
Users can report suspected policy violations through our support system. All reports are reviewed by our team, and appropriate action is taken based on the severity and nature of the violation.
Manual Review
Our team conducts manual reviews of suspicious activity, user reports, and automated system alerts. This ensures fair and accurate enforcement of our policies.
Reporting Violations
Help us maintain a safe and secure Service by reporting violations
Include Details
When reporting, please include:
- Account username or email
- Description of the violation
- Evidence or screenshots
- Date and time of occurrence
Frequently Asked Questions
Common questions about our Acceptable Use Policy
What happens if I violate the Acceptable Use Policy?
Violations are handled on a case-by-case basis. Minor violations may result in warnings, while severe violations can lead to immediate account termination. We reserve the right to take any action necessary to protect our Service and users.
Can I monitor competitor websites?
No, you may only monitor websites and services you own or have explicit written permission to monitor. Monitoring competitor websites without authorization violates our policy and may result in account termination.
What if I accidentally violate the policy?
If you believe you have accidentally violated our policy, contact our support team immediately. We will review your case and may provide a warning for first-time, unintentional violations.
How do you detect policy violations?
We use automated monitoring systems, user reports, and manual reviews to detect violations. Our systems analyze usage patterns, API calls, and account activity to identify potential policy violations.
Can I appeal a suspension or termination?
Yes, you may appeal enforcement actions by contacting our support team. Appeals are reviewed on a case-by-case basis, and decisions are final.
Will I receive a refund if my account is terminated?
No, accounts terminated for policy violations are not eligible for refunds. This is clearly stated in our Terms of Service and Refund Policy.
Policy Updates
We may update this Acceptable Use Policy from time to time. We will notify users of material changes via email or through our Service. Continued use of the Service after changes constitutes acceptance of the updated policy.