Acceptable Use Policy

Last updated: November 30, 2025

Introduction

This Acceptable Use Policy ("Policy") outlines the acceptable and prohibited uses of Jelliflow's services. This Policy applies to all users of our web application, Chrome browser extension, and related services (collectively, the "Service").

By using the Service, you agree to comply with this Policy. Violation of this Policy may result in suspension or termination of your account and access to the Service.

Acceptable Uses

Jelliflow is designed to help you create onboarding flows and product tours for your own applications and services. Acceptable uses include:

  • Recording user flows in applications you own, manage, or have permission to modify
  • Creating onboarding journeys and product tours for your users
  • Analyzing user interaction patterns in your own products
  • Collaborating with team members on journey creation
  • Testing and improving user onboarding experiences
  • Integrating Jelliflow into your web applications as intended
  • Using the Service for educational or training purposes within your organization

Prohibited Uses

You agree NOT to use the Service for any unlawful, harmful, or inappropriate purposes. Prohibited uses include, but are not limited to:

Illegal Activities

  • Using the Service to violate any applicable local, state, national, or international law or regulation
  • Recording or accessing systems, applications, or data without proper authorization
  • Engaging in any form of fraud, theft, or deception
  • Violating intellectual property rights, including copyright, trademark, patent, or trade secret infringement
  • Distributing malware, viruses, or other malicious code

Privacy Violations

  • Recording user interactions on websites or applications you do not own or have permission to monitor
  • Collecting, storing, or processing personal information without proper consent or legal basis
  • Recording sensitive personal information (health data, financial information, government IDs, etc.)
  • Violating privacy laws such as GDPR, CCPA, or other data protection regulations
  • Sharing recorded data containing personal information without proper authorization
  • Using the Service to track individuals without their knowledge or consent

Security Violations

  • Attempting to gain unauthorized access to our systems, servers, or networks
  • Circumventing, disabling, or interfering with security features of the Service
  • Using the Service to conduct security testing, vulnerability scanning, or penetration testing without written permission
  • Probing, scanning, or testing the vulnerability of any system or network
  • Breaching or attempting to breach any security or authentication measures
  • Using the Service to launch attacks (DDoS, brute force, etc.) against any system

Abuse and Harassment

  • Harassing, threatening, or intimidating other users or any individuals
  • Creating content that is defamatory, obscene, pornographic, or offensive
  • Promoting violence, discrimination, or hatred against individuals or groups
  • Impersonating any person or entity, or falsely representing your affiliation
  • Stalking, tracking, or monitoring individuals without consent

Service Abuse

  • Using automated systems (bots, scrapers, spiders) to access the Service without permission
  • Overloading, flooding, or spamming our servers or systems
  • Interfering with or disrupting the Service or servers connected to the Service
  • Reverse engineering, decompiling, or disassembling any part of the Service
  • Removing, modifying, or obscuring any proprietary notices or labels
  • Creating multiple accounts to circumvent usage limits or restrictions
  • Reselling, sublicensing, or otherwise monetizing access to the Service without permission

Inappropriate Content

  • Creating or sharing content that promotes illegal activities
  • Uploading or transmitting spam, chain letters, or unsolicited messages
  • Distributing or promoting pyramid schemes, multi-level marketing, or similar schemes
  • Creating fake or misleading onboarding flows designed to deceive users
  • Using the Service to phish, scam, or defraud users

Competitive Activities

  • Using the Service to develop, build, or offer a competing product or service
  • Benchmarking or conducting competitive analysis without permission
  • Copying features, functionality, or user interface elements for competitive purposes

Chrome Extension Specific Guidelines

When using the Jelliflow Chrome extension, you must:

Required Practices

  • Only record websites you own or manage: You must have proper authorization to record user interactions
  • Obtain user consent: If recording real user interactions (not your own), ensure users are informed and have consented
  • Respect privacy: Do not record sensitive information such as passwords, credit card numbers, social security numbers, or health data
  • Be transparent: Clearly disclose to your users if their interactions may be recorded
  • Secure your data: Protect recorded data and limit access to authorized team members only
  • Delete when done: Remove recordings that are no longer needed

Prohibited Practices

  • No surveillance: Do not use the extension to spy on users, competitors, or third-party websites
  • No unauthorized recording: Do not record interactions on websites you do not own without explicit permission
  • No sensitive data: Do not intentionally record passwords, financial information, or other sensitive personal data
  • No evasion: Do not attempt to bypass privacy protections built into the extension (e.g., input redaction)

Reporting Violations

If you become aware of any violations of this Acceptable Use Policy, please report them to us immediately:

We take all reports seriously and will investigate promptly. We may request additional information to help with our investigation.

Consequences of Violations

Violations of this Acceptable Use Policy may result in one or more of the following actions:

  • Warning: We may issue a formal warning for first-time or minor violations
  • Suspension: Temporary suspension of your account and access to the Service
  • Termination: Permanent termination of your account without refund
  • Legal Action: We may pursue legal action for serious violations, including but not limited to fraud, unauthorized access, or illegal activities
  • Law Enforcement: We may report violations to law enforcement authorities when required or appropriate
  • Data Deletion: We may delete your User Content and recordings

The specific action taken will depend on the nature and severity of the violation, as determined by us in our sole discretion.

User Responsibilities

As a Jelliflow user, you are responsible for:

  • Ensuring that your use of the Service complies with all applicable laws and regulations
  • Obtaining necessary permissions and consents before recording user interactions
  • Implementing appropriate privacy notices and policies for your users
  • Securing your account credentials and preventing unauthorized access
  • Monitoring the activities of team members who have access to your Jelliflow account
  • Promptly reporting any security incidents or policy violations
  • Maintaining backups of important data (we are not liable for data loss)

Monitoring and Enforcement

We reserve the right, but not the obligation, to:

  • Monitor usage of the Service to ensure compliance with this Policy
  • Investigate suspected violations of this Policy
  • Remove or disable access to content that violates this Policy
  • Suspend or terminate accounts that violate this Policy
  • Cooperate with law enforcement authorities in investigating violations
  • Take any other action we deem appropriate to enforce this Policy

We do not pre-screen User Content, but we may review content if a violation is reported or suspected.

Compliance with Laws

You are responsible for ensuring that your use of the Service complies with all applicable laws and regulations, including but not limited to:

  • Data Protection Laws: GDPR, CCPA, and other privacy regulations
  • Electronic Communications Laws: Laws governing recording and monitoring of electronic communications
  • Consumer Protection Laws: Laws protecting consumers from deceptive practices
  • Accessibility Laws: Laws requiring accessible digital content (e.g., ADA, WCAG)
  • Export Control Laws: Laws restricting the export of technology to certain countries
  • Industry-Specific Regulations: HIPAA (healthcare), FERPA (education), PCI-DSS (payment cards), etc.

Changes to This Policy

We may update this Acceptable Use Policy from time to time. We will notify you of any material changes by posting the new Policy on this page and updating the "Last updated" date. Your continued use of the Service after any changes constitutes your acceptance of the updated Policy.

Contact Us

If you have any questions about this Acceptable Use Policy, please contact us:

This Acceptable Use Policy is part of our Terms of Service. By using Jelliflow, you agree to comply with both documents.