1. Purpose and Scope
About This Policy
This Acceptable Use Policy ("AUP") governs your use of IntuneBrew and forms part of our Terms of Service. By using IntuneBrew, you agree to comply with this policy.
This policy applies to all users of IntuneBrew, including IT administrators, developers, and any other individuals who access or use the Service.
Our Commitment
We are committed to providing a reliable, secure, and fair platform for all users. This policy helps us maintain the integrity of our Service and protect our users, their organizations, and the broader community.
2. Permitted Use
What You Can Do
- Deploy macOS applications from our catalog to your Microsoft Intune tenant
- Monitor and manage application versions and updates
- Configure notification preferences for application updates
- Access the dashboard to view your deployed applications
- Use the API as documented for legitimate integration purposes
- Provide feedback and suggestions to improve the Service
- Access documentation and support resources
Authorized Users
The Service is intended for IT professionals and administrators who have legitimate access to Microsoft Intune within their organization. You must have appropriate permissions from your organization to deploy applications and must comply with your organization's IT policies.
3. Prohibited Activities
What You Must Not Do
The following activities are strictly prohibited:
Security Violations
- Attempting to gain unauthorized access to the Service, other user accounts, or related systems
- Circumventing, disabling, or otherwise interfering with security features
- Probing, scanning, or testing the vulnerability of the Service without authorization
- Attempting to decrypt, decompile, or reverse engineer any part of the Service
- Using another user's credentials or impersonating another user
- Sharing your authentication tokens or allowing others to access your account
Malicious Activities
- Deploying malware, viruses, trojans, or other malicious software
- Using the Service to distribute unauthorized or pirated software
- Uploading applications that contain security vulnerabilities intentionally
- Using the Service to facilitate any illegal activity
- Deploying applications that collect user data without proper consent
- Using the Service for cryptocurrency mining or similar resource-intensive activities
Service Abuse
- Overloading or attempting to crash the Service through excessive requests
- Circumventing or attempting to circumvent rate limits
- Using automated tools (bots, scrapers) without explicit permission
- Interfering with other users' ability to use the Service
- Reselling, sublicensing, or commercially exploiting the Service without authorization
- Creating multiple accounts to evade restrictions or abuse the Service
Data Misuse
- Scraping or harvesting user data from the Service
- Using data obtained from the Service for unauthorized purposes
- Violating the privacy rights of other users or third parties
- Transmitting personal data in violation of applicable data protection laws
4. API and Integration Usage
Microsoft Graph API
IntuneBrew uses Microsoft Graph API to interact with your Microsoft Intune tenant. When using our Service, you must:
- Comply with Microsoft's API Terms of Use
- Only request permissions that are necessary for your legitimate use case
- Not abuse or misuse Microsoft services through our platform
- Respect Microsoft's rate limits and service quotas
Rate Limits
To ensure fair use and service stability, we implement rate limits on API requests:
- Rate limits are applied per user and per endpoint
- Exceeding rate limits will result in temporary request blocking
- Persistent rate limit violations may result in account restrictions
- Rate limit information is provided in API response headers
Token Security
Your Microsoft access tokens are used to authenticate requests to Intune. You must never share these tokens, store them insecurely, or use them outside of the IntuneBrew platform. Tokens are encrypted during processing and are not stored permanently.
5. Account Responsibilities
Your Responsibilities
- Maintain the security of your Microsoft account credentials
- Use strong, unique passwords and enable multi-factor authentication
- Monitor your account for unauthorized access or suspicious activity
- Notify us immediately if you suspect your account has been compromised
- Log out from shared or public computers after using the Service
- Keep your contact information up to date
Organizational Use
If you use IntuneBrew on behalf of an organization, you are responsible for ensuring that all users within your organization comply with this policy. You should also ensure that your use of the Service complies with your organization's internal policies and any applicable regulations.
6. Content Standards
Application Catalog
Applications in our catalog are sourced from their official vendors and distributors. When deploying applications:
- Verify that you have the necessary licenses to use the applications
- Ensure compliance with the application vendor's terms of service
- Do not modify or tamper with application packages
- Report any issues or concerns about application packages
Feedback and Communications
When submitting feedback or communicating through the Service:
- Be respectful and professional in all communications
- Do not submit content that is offensive, defamatory, or discriminatory
- Do not include confidential information from third parties
- Do not submit spam or promotional content
7. Monitoring and Enforcement
How We Monitor
To ensure compliance with this policy and maintain service integrity, we may:
- Monitor usage patterns and API requests for anomalies
- Implement automated systems to detect policy violations
- Maintain audit logs of authentication and significant actions
- Investigate reports of policy violations
- Cooperate with law enforcement when required by law
What We Log
For security and compliance purposes, we maintain logs that may include:
- Authentication events (sign-in attempts, successes, and failures)
- API requests and responses (excluding sensitive data)
- Application deployment activities
- IP addresses and user agents
- Rate limit events
For more information about our data practices, see our Privacy Policy.
8. Reporting Violations
How to Report
If you become aware of any violation of this policy, please report it to us immediately. You can report violations by:
- Emailing support@ugurlabs.com
- Using the feedback form within the application
What to Include
When reporting a violation, please include:
- A description of the violation
- Any relevant evidence or screenshots
- The date and time of the incident (if known)
- Any other information that may help us investigate
Security Vulnerabilities
If you discover a security vulnerability in our Service, please report it responsibly to support@ugurlabs.com. We appreciate responsible disclosure and will work with you to address the issue promptly.
9. Consequences of Violations
Enforcement Actions
Violations of this policy may result in one or more of the following actions, depending on the severity and nature of the violation:
- Warning - A formal notice about the violation
- Temporary Suspension - Temporary restriction of access to the Service
- Rate Limit Reduction - Reduced API rate limits
- Account Termination - Permanent removal of access to the Service
- Legal Action - Pursuit of legal remedies where appropriate
Appeal Process
If you believe that enforcement action was taken against your account in error, you may appeal by contacting us at support@ugurlabs.com. Please provide a detailed explanation of why you believe the action was incorrect. We will review your appeal and respond within a reasonable timeframe.
10. Contact Information
If you have any questions about this Acceptable Use Policy, please contact us:
Ugur KocVon-Sauer-Str. 33b22761 Hamburg
Germany
Email: support@ugurlabs.com
Related Documents
- Terms of Service - Full terms and conditions
- Privacy Policy - How we handle your data
- Security Information - Our security practices