Explore what our students have built

Careers

Description in here

This Acceptable Use Policy (“AUP”) forms part of the Terms of Service or other agreement governing the use of monday.com’s Services (“Agreement”) and reflect the activities that are prohibited in connection with your use of the Services and/or any of monday.com’s Sites (as used herein collectively “Services”) in addition to the restrictions set forth in the Agreement. All capitalized terms not defined herein shall have the meaning set forth in the Agreement. 1. You represent and warrant that you shall not, and shall not cause or allow any third party to: 1.1. Access (or attempt to access), tamper with, reverse engineer, export, download or search any portion of the Services and/or its underlying or related infrastructures, systems, networks and technologies (“Systems”), by any means other than through the interface that is provided by us in connection with the Services or the Systems (e.g. scraping, spidering or crawling); 1.2. Probe, scan, or test the vulnerability of the Services or the Systems or breach or circumvent any security or authentication measures thereof; 1.3. Attempt to disrupt or overwhelm our infrastructure by imposing unreasonable requests or burdens on our resources (e.g. using “bots” or other automated systems to send requests to our servers at a rate beyond what could be sent by a human user during the same period of time); 1.4. Copy, modify, alter, change or create any derivative works of the Services or Systems, or any part thereof or otherwise remove proprietary marks from the Services or Systems; 1.5. Use the Services and/or the Systems to transmit malware or for phishing purposes; 1.6. Perform any activities or upload, submit, transmit or distribute any materials or Content (as defined below) that may harm or disrupt the operation of the Services, the Systems or any other infrastructure of monday.com or any third party; 1.7. Use the Services to perform any illegal, unlawful, fraudulent or deceptive activities or for competitive purposes; 1.8. Attempt to gain unauthorized access to the Services or the Systems to defeat, avoid, bypass, remove, deactivate, or otherwise circumvent any software protection or monitoring mechanisms of the Services or the Systems; 1.9. Impersonate any person, organization or entity, or falsely state or otherwise misrepresent your affiliation with any person, organization or entity; 1.10 Use the Services to violate the privacy of others, including posting private and confidential information of others, without their express authorization; 1.11. Use the Services to perform or encourage others to perform any activities that are defamatory, libelous or threatening, constitute hate speech, harassment, or stalking; 1.12. Upload, submit or transmit through the Services or the Systems any data, file, attachments, text, prompts, images, reports, software, links or any other content (“Content”) that contains or redirects (or may contain or redirect) to a virus, Trojan horse, worm, scripting exploits, bots or other harmful component or technology that may or is intended to damage or hijack the operation of any hardware, software (including the Services), or telecommunications equipment, or any other actually or potentially harmful, disruptive, or invasive code or component; 1.13. misuse or otherwise use the Services or the Systems in an excessive manner compared to the anticipated standard of use (examined at our sole discretion), including without limitation, consuming a massive amount of storage, or otherwise burdening the Services or the Systems in a manner that impairs its operation or in violation of the documentation or other instruction and/or operational restriction designated by us; 1.14. Send messages or communications which are (i) unlawful, or contain unlawful content (ii) unsolicited, including but not limited to spam, bulk messaging, or any other form of unwanted communication that does not comply with applicable spam laws ; (iii) sent or intended to be sent to contact(s) that were purchased, scraped, rented, obtained through unauthorized means, or otherwise acquired without explicit and verifiable consent from the recipients or (iv) to recipients who requested in any form not to receive messages or communications from you;