Stay organized with collections
Save and categorize content based on your preferences.
Looker's Acceptable Use Policy (AUP)
Last modified: March 9, 2020
Use of the Services is subject to this Acceptable Use Policy ("AUP").
Capitalized terms have the meaning stated in the Agreement between Customer and
Looker.
Looker may change this AUP from time to time without prior notice. In the event
that any changes are made, the revised AUP
will be posted on this URL.
Customer agrees not to, and not to allow third parties to use the Services:
- to violate, or encourage the violation of, the legal rights of others
(for example, this may include allowing Customer End Users to infringe or
misappropriate the intellectual property rights of others in violation of the
Digital Millennium Copyright Act);
- to engage in, promote or encourage illegal activity;
- for any unlawful, invasive, infringing, defamatory or fraudulent purpose
(for example, this may include phishing, creating a pyramid scheme or mirroring
a website);
- to generate, distribute, publish or facilitate unsolicited mass email,
promotions, advertisings or other solicitations ("spam");
- to alter or obscure mail headers;
- to intentionally distribute viruses, worms, Trojan horses, corrupted files,
hoaxes, or other items of a destructive or deceptive nature;
- to interfere with or disrupt the security, integrity, and/or performance of
the Services or the Looker Cloud infrastructure (including any deliberate
attempt to overload a system by mail bombing, news bombing, broadcast attacks,
or flooding techniques);
- to obtain or provide unauthorized access to the Services or the Looker
infrastructure;
- to monitor data or traffic without permission; perform any electronically
forging of any kind (e.g. Forging TCP-IP packet headers, email headers, or any
part of a message describing its origin);
- in a manner that avoids or is designed to allow others to avoid any use
limitations placed in the Services or Looker infrastructure.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],[],[],[],null,["# Looker's Acceptable Use Policy (AUP)\n\n- [Back to Google Cloud Terms Directory](/product-terms)\n- \n- Current\n\nLooker's Acceptable Use Policy (AUP)\n====================================\n\nLast modified: March 9, 2020\n| This is not the current version of this document and is provided for archival purposes. [View the current version](/terms/looker/legal/customers/aup)\nUse of the Services is subject to this Acceptable Use Policy (\"AUP\").\n\nCapitalized terms have the meaning stated in the Agreement between Customer and\nLooker.\n\nLooker may change this AUP from time to time without prior notice. In the event\nthat any changes are made, the revised AUP\nwill be posted on this URL.\n\nCustomer agrees not to, and not to allow third parties to use the Services:\n\n- to violate, or encourage the violation of, the legal rights of others (for example, this may include allowing Customer End Users to infringe or misappropriate the intellectual property rights of others in violation of the Digital Millennium Copyright Act);\n- to engage in, promote or encourage illegal activity;\n- for any unlawful, invasive, infringing, defamatory or fraudulent purpose (for example, this may include phishing, creating a pyramid scheme or mirroring a website);\n- to generate, distribute, publish or facilitate unsolicited mass email, promotions, advertisings or other solicitations (\"spam\");\n- to alter or obscure mail headers;\n- to intentionally distribute viruses, worms, Trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature;\n- to interfere with or disrupt the security, integrity, and/or performance of the Services or the Looker Cloud infrastructure (including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques);\n- to obtain or provide unauthorized access to the Services or the Looker infrastructure;\n- to monitor data or traffic without permission; perform any electronically forging of any kind (e.g. Forging TCP-IP packet headers, email headers, or any part of a message describing its origin);\n- in a manner that avoids or is designed to allow others to avoid any use limitations placed in the Services or Looker infrastructure."]]