Acceptable Use Policy

Defines acceptable use of our services, prohibited activities, and enforcement.

Related: Terms of Use, Security, and Human Rights Policy.

1. Purpose

To ensure safe and lawful use of Jooni services and connected devices, protect other users, and preserve service integrity.

2. Prohibited activities (examples)

  • Illegal activity or violation of others’ rights, including intellectual‑property infringement and privacy violations.
  • Harassment, threats, hate speech, or content that is unlawful or promotes violence.
  • Security abuse: malware, ransomware, phishing, credential stuffing, or attempting to bypass authentication/authorization.
  • Network/platform abuse: DoS/DDoS, excessive traffic generation, spamming, or unreasonable load on shared resources.
  • Interference with devices or services, tampering with firmware protections, or unauthorized access to another tenant’s data.
  • Reverse engineering or probing for vulnerabilities except through authorized channels and with permission.
  • High‑risk use without adequate safeguards (e.g., life support, nuclear, critical infrastructure) unless explicitly agreed.
  • Violations of export/sanctions laws, sales to or use by restricted parties or foreign adversaries, or use in terrorism, WMD, or unlawful surveillance.
  • Unsanctioned scraping or excessive automated polling that degrades service for others.
  • RF/spectrum misuse, including jamming, spoofing, operating outside approved bands, unauthorized power levels, or using non‑compliant antennas.
  • Unsafe deployments that bypass required regulatory approvals, product labels, warnings, or installation instructions.

3. Customer responsibilities

  • Maintain the security of credentials, keys, and devices; enable MFA/SSO where available; do not share credentials or seats.
  • Configure reasonable rate limits, retention, and alerting for deployments to prevent abuse.
  • Ensure that your end users and integrators comply with this AUP and applicable laws.

4. Device safety & RF/spectrum compliance

  • Comply with local spectrum and product regulations (e.g., FCC, CE/RED, UKCA) and installation requirements.
  • Operate only in approved bands with compliant antennas, power levels, and emissions; avoid harmful interference.
  • Follow device safety, labeling, and environmental guidance; do not use in life‑critical contexts unless expressly agreed.

5. Human‑rights alignment

We may decline, suspend, or terminate services for customers or end uses that violate our Human Rights Policy or applicable human‑rights laws, and may restrict features, geographies, or integrations to mitigate risk.

6. Monitoring

We may monitor service usage (including automated signals) to detect abuse and ensure reliability and security, in accordance with Privacy and DPA obligations.

7. Sanctions & export compliance

You must comply with export control and sanctions laws. See Export & Market Availability for details. We may block access based on geography, end user, or end use to comply with law and policy.

8. Enforcement

  • We may rate‑limit, suspend, or terminate access, remove content, or block traffic to protect the service and others.
  • We reserve the right to notify affected parties or authorities where required by law.
  • Violations may result in contract termination pursuant to the Terms of Use. You are responsible for ensuring any radio operation complies with local regulations and device certification conditions.

9. Reporting

To report abuse or an AUP concern, contact us via the Contact page with relevant details.

10. Changes

We may update this AUP from time to time. Material changes will apply prospectively and be posted here.