Acceptable Use Policy
Effective Date: February 22, 2026
This Acceptable Use Policy (the "AUP") describes activities that are prohibited in connection with use of the StreamFlows service (the "Services") operated by Atomic Bytes LLC ("Atomic Bytes," "we," "us," or "our"). Capitalized terms not defined herein shall have the meanings ascribed to them in the StreamFlows Terms of Service at https://streamflows.cloud/terms (the "Terms"). This AUP is hereby incorporated by reference into, and made a part of, the Terms.
-
Acceptable Use: BY USING THE SERVICES YOU AGREE NOT TO:
- use the Services for any illegal purpose, or in violation of any local, state, national, or international law or regulation;
- copy, modify, or distribute any portion of the Services;
- violate, or encourage others to violate, the rights of third parties, including any Intellectual Property Rights, privacy, or contractual rights;
- import, transmit, or otherwise make available, through the Services, any Customer Data that is unlawful, defamatory, libelous, harassing, fraudulent, deceptive, or invasive of another's privacy;
- use the Services to engage in or promote any harmful, offensive, inappropriate, fraudulent, deceptive, or illegal activity;
- sell, sublicense, rent, lease, or otherwise transfer the access granted herein to the Services or any output thereof, other than to Your Affiliates, including on a time-share or service-bureau basis;
- use or apply, directly or indirectly, the Services in any manner competitive with the business of Atomic Bytes, including for benchmarking or competitive analysis;
- use the Services to violate the security or integrity of, or otherwise abuse, any application, computing device, system, or network (each a "System") of any party, including by accessing or using any System without permission (including attempting to probe, scan, monitor, or test the vulnerability of a System), forging any headers or other parts of any message describing its origin or routing, interfering with the proper functioning of any System (including any deliberate attempt by any means to overload a System), implementing denial-of-service attacks (inundating a target with communications requests so it cannot respond effectively or at all to legitimate traffic), operating non-permissioned network services (including open proxies, mail relays, or recursive domain name servers), or using any means to bypass System usage limitations;
- attempt to gain access to any Systems or networks that connect to the Services, except as required to access the Services as provided hereunder;
- use the Services to distribute or facilitate the sending of unsolicited mass communications, promotions, or solicitations (including any "spam");
- interfere with or disrupt the operation of the Services, including by (i) reverse engineering, decompiling, disassembling, or otherwise attempting to discover the source code of the Services or any part thereof, except to the extent that such activity is expressly permitted by applicable law; (ii) performing any fraudulent activity, including impersonating any person or entity, claiming false affiliations, or accessing the Account of others without permission; or (iii) intentionally interfering with or damaging the operation of the Services or any User's enjoyment thereof, including by uploading or otherwise disseminating viruses or other malicious code;
- use the credentials of another customer or User without authorization, or share Your own credentials in violation of the Terms; or
- permit or authorize a third party to do any of the foregoing.
-
Reservation of Rights: Atomic Bytes reserves the right, in its sole and reasonable discretion and without prior notice, to: (i) suspend, throttle, or terminate access to the Services for any actual or suspected violation of this AUP; (ii) remove or refuse to process Customer Data that violates this AUP or applicable law; (iii) investigate any actual or suspected violation, including by reviewing relevant logs and Operational Records; and (iv) cooperate with law enforcement or governmental authorities in connection with any investigation of unlawful activity. The exercise of any right under this AUP shall not limit Atomic Bytes' other rights and remedies under the Terms or applicable law, including the right to seek damages, injunctive relief, or termination for cause.
-
Reporting Abuse: To report a violation of this AUP, including any suspected security incident or abuse originating from the Services, You shall contact Atomic Bytes at [email protected].
-
Changes: Atomic Bytes may update this AUP from time to time. When Atomic Bytes makes material changes, Atomic Bytes shall notify You by email or in-product notice and shall update the Effective Date set forth at the top of this AUP. Continued use of the Services after the effective date of a change shall constitute acceptance of the updated AUP.
Copyright © 2026 Atomic Bytes LLC. All Rights Reserved.