Beer Mug Logo
IntuneBrewby UgurLabs.com

Legal

Acceptable Use Policy

This policy outlines the acceptable and prohibited uses of IntuneBrew to ensure a safe and reliable service for all users.

Last updated: January 2025

1. Purpose and Scope

About This Policy

This Acceptable Use Policy ("AUP") governs your use of IntuneBrew and forms part of our Terms of Service. By using IntuneBrew, you agree to comply with this policy.

This policy applies to all users of IntuneBrew, including IT administrators, developers, and any other individuals who access or use the Service.

Our Commitment

We are committed to providing a reliable, secure, and fair platform for all users. This policy helps us maintain the integrity of our Service and protect our users, their organizations, and the broader community.

2. Permitted Use

What You Can Do

  • Deploy macOS applications from our catalog to your Microsoft Intune tenant
  • Monitor and manage application versions and updates
  • Configure notification preferences for application updates
  • Access the dashboard to view your deployed applications
  • Use the API as documented for legitimate integration purposes
  • Provide feedback and suggestions to improve the Service
  • Access documentation and support resources

Authorized Users

The Service is intended for IT professionals and administrators who have legitimate access to Microsoft Intune within their organization. You must have appropriate permissions from your organization to deploy applications and must comply with your organization's IT policies.

3. Prohibited Activities

What You Must Not Do

The following activities are strictly prohibited:

Security Violations

  • Attempting to gain unauthorized access to the Service, other user accounts, or related systems
  • Circumventing, disabling, or otherwise interfering with security features
  • Probing, scanning, or testing the vulnerability of the Service without authorization
  • Attempting to decrypt, decompile, or reverse engineer any part of the Service
  • Using another user's credentials or impersonating another user
  • Sharing your authentication tokens or allowing others to access your account

Malicious Activities

  • Deploying malware, viruses, trojans, or other malicious software
  • Using the Service to distribute unauthorized or pirated software
  • Uploading applications that contain security vulnerabilities intentionally
  • Using the Service to facilitate any illegal activity
  • Deploying applications that collect user data without proper consent
  • Using the Service for cryptocurrency mining or similar resource-intensive activities

Service Abuse

  • Overloading or attempting to crash the Service through excessive requests
  • Circumventing or attempting to circumvent rate limits
  • Using automated tools (bots, scrapers) without explicit permission
  • Interfering with other users' ability to use the Service
  • Reselling, sublicensing, or commercially exploiting the Service without authorization
  • Creating multiple accounts to evade restrictions or abuse the Service

Data Misuse

  • Scraping or harvesting user data from the Service
  • Using data obtained from the Service for unauthorized purposes
  • Violating the privacy rights of other users or third parties
  • Transmitting personal data in violation of applicable data protection laws

4. API and Integration Usage

Microsoft Graph API

IntuneBrew uses Microsoft Graph API to interact with your Microsoft Intune tenant. When using our Service, you must:

  • Comply with Microsoft's API Terms of Use
  • Only request permissions that are necessary for your legitimate use case
  • Not abuse or misuse Microsoft services through our platform
  • Respect Microsoft's rate limits and service quotas

Rate Limits

To ensure fair use and service stability, we implement rate limits on API requests:

  • Rate limits are applied per user and per endpoint
  • Exceeding rate limits will result in temporary request blocking
  • Persistent rate limit violations may result in account restrictions
  • Rate limit information is provided in API response headers

Token Security

Your Microsoft access tokens are used to authenticate requests to Intune. You must never share these tokens, store them insecurely, or use them outside of the IntuneBrew platform. Tokens are encrypted during processing and are not stored permanently.

5. Account Responsibilities

Your Responsibilities

  • Maintain the security of your Microsoft account credentials
  • Use strong, unique passwords and enable multi-factor authentication
  • Monitor your account for unauthorized access or suspicious activity
  • Notify us immediately if you suspect your account has been compromised
  • Log out from shared or public computers after using the Service
  • Keep your contact information up to date

Organizational Use

If you use IntuneBrew on behalf of an organization, you are responsible for ensuring that all users within your organization comply with this policy. You should also ensure that your use of the Service complies with your organization's internal policies and any applicable regulations.

6. Content Standards

Application Catalog

Applications in our catalog are sourced from their official vendors and distributors. When deploying applications:

  • Verify that you have the necessary licenses to use the applications
  • Ensure compliance with the application vendor's terms of service
  • Do not modify or tamper with application packages
  • Report any issues or concerns about application packages

Feedback and Communications

When submitting feedback or communicating through the Service:

  • Be respectful and professional in all communications
  • Do not submit content that is offensive, defamatory, or discriminatory
  • Do not include confidential information from third parties
  • Do not submit spam or promotional content

7. Monitoring and Enforcement

How We Monitor

To ensure compliance with this policy and maintain service integrity, we may:

  • Monitor usage patterns and API requests for anomalies
  • Implement automated systems to detect policy violations
  • Maintain audit logs of authentication and significant actions
  • Investigate reports of policy violations
  • Cooperate with law enforcement when required by law

What We Log

For security and compliance purposes, we maintain logs that may include:

  • Authentication events (sign-in attempts, successes, and failures)
  • API requests and responses (excluding sensitive data)
  • Application deployment activities
  • IP addresses and user agents
  • Rate limit events

For more information about our data practices, see our Privacy Policy.

8. Reporting Violations

How to Report

If you become aware of any violation of this policy, please report it to us immediately. You can report violations by:

What to Include

When reporting a violation, please include:

  • A description of the violation
  • Any relevant evidence or screenshots
  • The date and time of the incident (if known)
  • Any other information that may help us investigate

Security Vulnerabilities

If you discover a security vulnerability in our Service, please report it responsibly to support@ugurlabs.com. We appreciate responsible disclosure and will work with you to address the issue promptly.

9. Consequences of Violations

Enforcement Actions

Violations of this policy may result in one or more of the following actions, depending on the severity and nature of the violation:

  • Warning - A formal notice about the violation
  • Temporary Suspension - Temporary restriction of access to the Service
  • Rate Limit Reduction - Reduced API rate limits
  • Account Termination - Permanent removal of access to the Service
  • Legal Action - Pursuit of legal remedies where appropriate

Appeal Process

If you believe that enforcement action was taken against your account in error, you may appeal by contacting us at support@ugurlabs.com. Please provide a detailed explanation of why you believe the action was incorrect. We will review your appeal and respond within a reasonable timeframe.

10. Contact Information

If you have any questions about this Acceptable Use Policy, please contact us:

Ugur KocVon-Sauer-Str. 33b
22761 Hamburg
Germany

Email: support@ugurlabs.com

Related Documents