Acceptable Use Policy

Effective starting: December 24, 2020

At Entefy, our mission is to save people time so that they can live and work better. To be true to our mission, it is vital that our products and services function properly and without interruption. And this will require support from our users not to misuse or abuse Entefy products or services.

This Acceptable Use Policy describes what we mean by “misuse” or “abuse” and helps us identify such transgressions, and react accordingly . Under this policy, we reserve the right to remove content that is inconsistent with the spirit of this policy, even if it’s something that is not forbidden by the letter of the policy. In other words, if you do something that isn’t listed here verbatim, but it appears like something listed here, we may still remove it. Without affecting any other remedies available to us, we may temporarily or permanently suspend or terminate a user’s account or access to the services without notice or liability if we (in our sole discretion) determine that a user has violated this Acceptable Use Policy.

The word “services” throughout this policy refers to all websites, user interfaces, applications and products owned or operated by Entefy, and any related websites, sub-domains and pages, as well as any services provided by Entefy through them. The word “content” means: (1) any and all data, text, software, sounds, images, videos, or other information that you post, upload, share, submit, or otherwise provide in any manner to the services and (2) any other materials, content, or data you provide to Entefy or use with Entefy services or products or in relation to support of those services or products.

We won’t allow:


  • Compromising the integrity of our systems. This could include scanning, probing, or testing the vulnerability of any system or network that hosts our services. This does not apply to security assessments expressly permitted by Entefy
  • Tampering with, reverse-engineering, or hacking our services, circumventing any security or authentication measures, or attempting to gain unauthorized access to the data, services, related systems, or networks
  • Disabling, modifying , or compromising the integrity or performance of the services or related systems, network or data
  • Deciphering any transmissions from or to the servers running the services
  • Overwhelming or attempting to overwhelm our infrastructure by imposing an unreasonably large load on our systems that consumes extraordinary or unreasonable amount of resources (CPUs, memory, disk space, bandwidth, etc.), such as:
    • Using “offline readers,” “spiders,” “robots,” or other automated systems to send more request messages to our servers than a human could reasonably send in the same period of time by using a normal browser or provided user interface
    • Going beyond the use parameters for any given service as described in its corresponding documentation or provided in accordance to the license granted by Entefy for the use of the product or service
    • Consuming an unreasonable amount of computing resources or storage in a way that’s unrelated to the purposes for which the services were designed or in excess to the rights granted by license

Wrongful activities

  • Misrepresenting yourself, or disguising the origin of any content (including by “phishing,” “spoofing,” manipulating headers or other identifiers, impersonating anyone else, or falsely implying any sponsorship or association with Entefy or any third party)
  • Using the services to violate the privacy of others, including posting or publishing other people’s private or confidential information without their express permission, or gathering or collecting other people’s personal information (including account names or information) from our services
  • Using our services directly or indirectly to harass, stalk, or post direct, specific threats of violence against others
  • Using the services in violation of any laws (including without limitation data, privacy, and export control laws) or for any illegal purpose
  • Searching, probing or accessing any part of the services by any means other than our publicly supported interfaces (such as “scraping”)
  • Using meta tags or any other “hidden text” including Entefy’s or our suppliers’ or developers’ trademarks or product names
  • Using the services for the purpose of providing alerts on disaster scenarios or any other situations directly related to health or safety, including but not limited to natural disasters, acts of terrorism, or emergency response

Inappropriate communications

  • Using the services to generate or send spam, advertising, chain letters, or unsolicited communications
  • Soliciting Entefy users, affiliates, vendors or partners for commercial purposes, unless expressly permitted by Entefy
  • Disparaging Entefy or our affiliates, vendors or partners
  • Advertising or promoting or products or services other than your own without appropriate authorization

Inappropriate content
Posting, sharing, submitting, uploading or otherwise providing content that:

  • You don’t have the right to post, submit, share, upload or otherwise provide
  • Infringes Entefy’s or a third party’s intellectual property or other rights, including any patent, copyright, trademark, trade secret, moral rights, privacy rights of publicity, or any other intellectual property right or contractual or proprietary right
  • Is deceptive, illegal, obscene, defamatory, fraudulent, libelous, threatening, harmful to minors, pornographic (including child pornography, which we will remove and report to law enforcement), indecent, harassing or hateful
  • Is intended to be inflammatory
  • Encourages conduct that is tortious or illegal or otherwise inappropriate
  • Attacks others based on their ethnicity, national origin, race, religion, sexual orientation, sex, gender, disability, or medical condition
  • Contains viruses, worms, bots, scripting exploits, or other similar materials
  • Could otherwise cause damage to Entefy or any third party