Acceptable Use Policy
Last Updated July 1, 2019
Red Hat is providing You with access to certain Red Hat® Services (which may include software, networking, and other computing resources) (collectively, the “Red Hat Platform”) for Your lawful consumption and use in conformance with their intended use (as generally described on the relevant Red Hat website associated with the particular Red Hat Service). In connection with the Red Hat Services, You and/or your users may provide or use “Content” (as defined in the Services Agreement) in connection with the Red Hat Platform. Your use of the Red Hat Platform, including Content, is subject to the restrictions set forth in this Acceptable Use Policy, in addition to the terms of Your agreement with Red Hat (Your “Services Agreement”). Red Hat may change or modify this Acceptable Use Policy at any time and for any reason by posting a new version of this Policy at https://www.openshift.com/legal/acceptable-use. You are responsible for monitoring this site and ensuring you are aware of the current terms. If you violate this Acceptable Use Policy, we may suspend or terminate your access to the Red Hat Platform. Set forth below are examples of prohibited conduct and Content in order to assist you in your use. Please note, however, that this list below is not exhaustive and you should follow the overriding principles contained in each section below.
No illegal, harmful or obscene content
Your use of the Red Hat Platform is subject to all applicable laws and regulations, and you agree not to violate such laws and/or regulations. In addition, you agree not to post, distribute, promote, facilitate or transmit any of the following through use of the Red Hat Platform:
- Illegal Content including Content that incorporates gambling or child pornography.
- Content that violates, misappropriates or infringes the third party intellectual property rights of others.
- Content that solicits, encourages or promotes the use of illegal substances or activities.
- Content that is threatening, abusive, harassing, defamatory, libelous, derogatory or violent.
- Content that is invasive of a third party's legal rights (including privacy or publicity rights).
- Content that is vulgar, obscene, bigoted or hateful or that advocates racial or ethnic intolerance.
- Content that is profane, scandalous, pornographic, indecent or otherwise objectionable.
- Content that is malicious or contains technology that may damage, interfere with, or intercept any system, program or data, including viruses, Trojan horses, worms, time bombs or other harmful or disruptive components.
No illegal, abusive or harmful actions
We are providing access to the Red Hat Platform for the purposes generally described on the Red Hat website relevant to the specific Red Hat Services and not for the purpose of interfering with other users' enjoyment or to harass third parties. For these reasons, you are prohibited from actions such as the following:
- Using the Red Hat Services or Red Hat Platform for any act or action that gives rise to civil or criminal liability for yourself or for Red Hat or otherwise violates any applicable law.
- Engaging in any activity that inappropriately restricts or inhibits any other user from using or enjoying the Red Hat Platform, including "hacking", "cracking", "spoofing", or defacing any portions of the Red Hat Platform, including any Red Hat websites.
- Posting, distributing or transmitting chain letters, mass mailings, spam mail, any robot, spider, site search/retrieval application, or other manual or automatic device or process to retrieve, index or "data mine".
- Harvesting or collecting information about Red Hat Platform users without their express written consent.
- Interfering with others' enjoyment of the Red Hat Platform, including intentionally attempting to overload any portion of the Red Hat Platform.
- Launching or facilitating a denial of service attack (DoS) from or on the Red Hat Platform.
- Using the Red Hat Platform in connection with illegal or unlawful file sharing.
- Using the Red Hat Platform to operate a general-purpose proxy or “open proxy” service.
- Using the Red Hat Platform as a “miner” or “forger” of BitCoin or other cryptocurrencies.
While we strive to make our service as useful as possible, we don't support all workload profiles on the Red Hat Online Services offered as a free service. Distributed processing or other activities that continuously exhaust a specific resource (e.g. CPU, Network, Memory) are not allowed. Applications are allowed to consume available resources for a short period of time, but not continuously. If you have questions about your use case, feel free to contact us.
No prohibited access or security breaches
You may not use the Red Hat Platform in any manner that would compromise or violate the security of the Red Hat Platform or other users of the Red Hat Platform, including but not limited to engaging in any of the following:
- Accessing or using the Red Hat Platform in violation of law, the terms of the Services Agreement or without permission, including attempting to test the vulnerability of the security of the Red Hat Platform or to breach any of the security measures of the Red Hat Platform.
- Imitating or impersonating another person or his or her email address or creating false accounts intended to misrepresent yourself or the source of your email.
- Intercepting or monitoring activity on the Red Hat Platform without permission.
- Accessing any other host, user or network without permission.
- Using any means to circumvent the security limitations of the Red Hat Platform.
Monitoring and reporting
Red Hat encourages you to report violations of this Acceptable Use Policy to Red Hat immediately. Red Hat has the right, but not the obligation, to monitor Your activity and Content to determine compliance with this Acceptable Use Policy. Red Hat has the right in its sole discretion to edit, refuse to post or remove any material submitted to or posted on a Red Hat website or other Red Hat Platform resource that we find to be in violation of this Acceptable Use Policy or is otherwise objectionable. You are solely responsible for Your activities and any Content you post, transmit or otherwise make available on a Red Hat website or other Red Hat Platform resource. You acknowledge and agree that Red Hat does not have any liability for any action or inaction with respect to Your conduct, communication or posting on a Red Hat website or other Red Hat Platform resource. We may report any activity that we believe may violate any law to law enforcement, regulators or other relevant third parties.
Remote security testing
No remote security testing (including penetration testing) may be done at any time for the Red Hat Services without prior written approval. You may contact technical support with any questions.
Quota and limits
3scale Usage Conditions
API Calls generated in both production and non-production environments will count towards the number of API Calls. It is your responsibility to purchase Subscription Services in amount that can reasonably accommodate traffic spikes consistent with the level of Subscription Services you have purchased. Without limiting the foregoing obligation, Red Hat reserves the right to suspend the Red Hat Online Services without notice if your API Call volumes exceed four times (4x) the per second limit. "Per second limit” means two times the maximum number of API Calls allowable per day in your contracted Subscription tier divided by the number of seconds in a day rounded up to the nearest whole number. For example, if your maximum API Calls per day is Three Million (3,000,000), the per second limit would be equal to Seventy (70). Red Hat reserves the right to suspend the Red Hat Online Subscriptions if your API call volumes exceed the maximum limits of Fifty Million (50,000,000) per day, Thirty Thousand (30,000) per minute or One Thousand (1,000) per second, unless otherwise agreed by the parties in writing. There is no limit on the number of environments and locations where you maybe deploy API management agents.
3scale Utilization Policy
Red Hat evaluates quota compliance on a monthly basis. If your actual API calls exceed the Daily Limit for two or more days per month, you will either (a) reduce traffic consumption to return to compliance with the number of Units you purchased; or (b) purchase additional Subscription Services. Red Hat also reserves the right to evaluate your API Call volume on a per second limit basis (defined above) in a two week period (“Throughput”). For purposes of calculating Throughput, Red Hat will remove the top 5% peaks of your API Calls during that period. In other words, Throughput can exceed the amount of API Calls you have purchased 5% of the time in each of the 2 weeks. If your Throughput exceeds the rate you purchased more than 5% of the time during the month, you will either (a) reduce traffic consumption to return to compliance with the number of Units you purchased or (b) purchase additional Subscription Services.
3scale Data Retention Policy
During Customer use of 3scale services, 3scale may calculate and optionally store statistics and/or logs of the Customer traffic that the customer reports to 3scale using the provided 3scale APIs. 3scale may limit the period of storage of this statistical data depending on the contract type that the customer maintains with 3scale. 3scale commits to retain the statistical data for a minimum of 1 year for paid accounts. 3scale makes no commitment to minimal storage time for free accounts and may remove stored statistical data at any time with no warning.