banner background banner background
JFrog banner JFrog banner
JFrog Logo JFrog Logo
  • Products
  • Solutions
  • Pricing
  • Developers
  • Resources
  • Partners
  • Become a JFrog Partner >
  • Find a JFrog Partner >
  • Get Help >
  • Community >
  • Documentation >
  • Integrations >
  • Applications >
Use Case
  • Cloud Solutions
    • Flexible Cloud Deployment Solutions
  • MLOps
    • AI/ML Development and Deployment
    • MLSecOps
  • DevOps
    • Artifact Management
    • Tool Consolidation
    • CI/CD
  • DevSecOps
    • Holistic Software Supply Chain Security
    • Curate Open-Source Packages
    • Source Code Scanning (SAST)
    • Software Composition Analysis (SCA)
    • Secrets Detection
    • Infrastructure as Code (IaC) Security
  • Device/IoT
    • Connected Device Management
Integrations
  • GitHub >
  • NVIDIA >
  • Docker >
  • Maven >
  • See all integrations >
Industry
  • Financial Services >
  • Public Sector >
  • Technology >
  • Healthcare >
  • Gaming >
  • Automotive >
Learning & Guides
  • JFrog Help Center >
  • Security Research >
  • JFrog Academy >
  • Events >
  • Webinars & Workshops >
  • DevOps Consulting Services >
  • DevOps Certification >
  • State of Union Report >
  • What are DevOps Tools? >
Collateral
  • Resource Center >
  • JFrog Blog >
  • Customer Stories >
Customer Zone
  • Support >
    Customer support, tickets and community
  • Manage & Troubleshoot >
    Renew, retrieve licenses, legal and more
  • MyJFrog >
    Cloud customer portal
  • Cloud Status >
    Service status & event subscription
  • JFrog Trust >
    How we protect you & your data
The JFrog Platform
Deliver Trusted Software with Speed

The only software supply chain platform to give you end-to-end visibility, security, and control for automating delivery of trusted releases. Bring together DevOps, DevSecOps and MLOps teams in a single source of truth.
View Platform
DevOps
JFrog Artifactory
Universal Artifact & ML Model Repository Manager
JFrog Pipelines
Enterprise Grade CI/CD & Workflow Automation
JFrog Distribution
Secure Distribution Across Consumption Points
JFrog Connect
JFrog Connect
IoT Device Management with DevOps Agility
DevSecOps
JFrog Curation
Seamlessly Curate Software Packages & ML Models
JFrog Security Essentials (Xray)
Integrated SCA for Software & AI Artifacts
JFrog Advanced Security
Supply Chain Exposure Scanning & Impact Analysis
JFrog Runtime
Real-time visibility into runtime vulnerabilities
MLOps
JFrog ML
Build, Train, Secure, Deploy, Serve and Monitor ML Models and GenAI
Fr De 日本語 简体中文
Contact Us
1 (800) 986-4316
Start Free
  • Products
    The JFrog Platform
    Deliver Trusted Software with Speed

    The only software supply chain platform to give you end-to-end visibility, security, and control for automating delivery of trusted releases. Bring together DevOps, DevSecOps and MLOps teams in a single source of truth.
    View Platform
    • DevOps

      • JFrog Artifactory
        Universal Artifact & ML Model Repository Manager
      • JFrog Pipelines
        Enterprise Grade CI/CD & Workflow Automation
      • JFrog Distribution
        Secure Distribution Across Consumption Points
      • JFrog Connect
        JFrog Connect
        IoT Device Management with DevOps Agility
    • DevSecOps

      • JFrog Curation
        Seamlessly Curate Software Packages & ML Models
      • JFrog Security Essentials (Xray)
        Integrated SCA for Software & AI Artifacts
      • JFrog Advanced Security
        Supply Chain Exposure Scanning & Impact Analysis
      • JFrog Runtime
        Real-time visibility into runtime vulnerabilities
    • MLOps

      • JFrog ML
        Build, Train, Secure, Deploy, Serve and Monitor ML Models and GenAI
  • Solutions
    • Use Case
      • Cloud Solutions
        • Flexible Cloud Deployment Solutions
      • MLOps
        • AI/ML Development and Deployment
        • MLSecOps
      • DevOps
        • Artifact Management
        • Tool Consolidation
        • CI/CD
      • DevSecOps
        • Holistic Software Supply Chain Security
        • Curate Open-Source Packages
        • Source Code Scanning (SAST)
        • Software Composition Analysis (SCA)
        • Secrets Detection
        • Infrastructure as Code (IaC) Security
      • Device/IoT
        • Connected Device Management
    • Integrations
      • GitHub
      • NVIDIA
      • Docker
      • Maven
      • See all integrations
    • Industry
      • Financial Services
      • Public Sector
      • Technology
      • Healthcare
      • Gaming
      • Automotive
  • Pricing
  • Developers
      • Community
      • Documentation
      • Integrations
      • Applications
  • Resources
    • Learning & Guides
      • JFrog Help Center
      • Security Research
      • JFrog Academy
      • Events
      • Webinars & Workshops
      • DevOps Consulting Services
      • DevOps Certification
      • State of Union Report
      • What are DevOps Tools?
    • Collateral
      • Resource Center
      • JFrog Blog
      • Customer Stories
    • Customer Zone
      • Support
        Customer support, tickets and community
      • Manage & Troubleshoot
        Renew, retrieve licenses, legal and more
      • MyJFrog
        Cloud customer portal
      • Cloud Status
        Service status & event subscription
      • JFrog Trust
        How we protect you & your data
  • Partners
      • Become a JFrog Partner
      • Find a JFrog Partner
      • Get Help
  • Self Hosted Terms and Conditions
    • Self Hosted Terms and Conditions
    • Enterprise + Distribution Edge Addendum
    • Previous Versions
  • Cloud Terms and Conditions
    • Cloud Terms and Conditions
    • Container Registry Cloud
    • Previous Versions
  • Hybrid Terms and Conditions
  • About Box
  • Support
    • Standard SLA
    • Gold Support & SLA
    • Platinum Support & SLA
  • Privacy and Security
    • JFrog Cloud Data Processing Addendum
    • JFrog Cloud Data Security Addendum
    • JFrog Trust Center
    • JFrog Privacy Center
    • JFrog Privacy Notice
    • JFrog Cookies Policy
  • JFrog Consulting Services Agreement
  • JFrog Brand Guidelines
  • Website Terms of Use
  • JFrog Acceptable Use Policy
  • JFrog Agreement – Trial

JFrog Acceptable Use Policy

Last Updated: February 12, 2024

This Acceptable Use Policy (“Policy”) is a guideline designed to ensure the proper use of the products and services offered by JFrog and its affiliates (“Services”) and our website(s) including https://jfrog.com/ (“Site”). This Policy supplements, and is incorporated into the applicable JFrog terms and conditions currently available at https://jfrog.com/terms-and-conditions/. 

JFrog may modify this Policy at any time by posting a revised version on the Site. By using the Services or accessing the Site, you agree to the latest version of this Policy.

Prohibited Activities. You may not use, attempt to use, or allow others to use the Services or the Site in any of the following ways:

  • Violations of Laws. For any fraudulent activity or in violation of any laws.
  • Violating Rights of Others. To violate the rights of others.
  • Inappropriate Content. To publish or store content that constitutes child sexually exploitative material, or to threaten, incite, promote, or actively encourage violence, terrorism, or other serious harm.
  • Service Disruption. To disrupt the experience of other JFrog users or interfere with the security or integrity of the Services or any other conduct that attempts to disable or overload the Services.
  • Bypassing Service Limitations. To bypass, exploit, or disable limitations or restrictions placed on the Services.
  • System Security. To compromise the security of the Services. This includes, but is not limited to, engaging in activities that disrupt, interfere with, or inhibit any other user from using and enjoying the Services. Hacking, spreading malware, bypassing security measures, or any other form of unauthorized access is strictly prohibited.
  • Reverse Engineering. To reverse engineer, copy, disassemble, or decompile any part of the Services, or use any robot, spider, site search/retrieval application or other device to retrieve, index, “scrape,” or “data mine” any content from the Services.
  • Falsification of Identity or Origin. To create a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.

Investigation and Reporting. Violations of this policy may result in temporary or permanent suspension of access to JFrog’s Services. You agree to cooperate with us to remedy any violation. JFrog may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties.

Products
  • Artifactory
  • Xray
  • Curation
  • Pipelines
  • Distribution
  • Container Registry
  • Connect
  • JFrog ML
  • JFrog Platform
  • Start Free
Resources
  • Blog
  • Security Research
  • Events
  • Integrations
  • JFrog Help Center
  • Software Supply Chain Topics
  • Open Source
  • JFrog Trust
  • Compare JFrog
Company
  • About
  • Management
  • Investor Relations
  • Partners
  • Customers
  • Careers
  • Press
  • Contact Us
  • Brand Guidelines
Developer
  • Community
  • Downloads
  • Community Events
  • Open Source Foundations
  • Community Forum
  • Superfrogs
  • Applications
lang-switcherEnarrow
  • En
  • Fr
  • De
  • 日本語
  • 简体中文
Follow Us
© 2024 JFrog Ltd All Rights Reserved
Discover More
  • SUBSCRIPTION AGREEMENT – SELF-HOSTED
  • What is a Software Supply Chain?
  • Cloud Data Processing Addendum
JFrog Logo
Terms of Use | Privacy Notice | Cookies Policy |
Cookies Settings
| Accessibility Notice | Accessibility Mode

Success

Your action was successful

Oops... Something went wrong

Please try again later

Information

frog hand

Modal Message

US Flag
Click Here
JFrog Logo
Chinese Flag
请点这里