Last Updated: February 27, 2026
See also: Terms of Service
Acceptable Use Policy
This Acceptable Use Policy establishes the rules of conduct for any individual accessing the Service. By accessing the Service, you represent that you are at least eighteen years of age and you agree to comply with this Policy.
In this Policy, "Company" refers to Requirement Yogi SAS (registered under number 812 048 452 RCS Grasse, headquartered at Les Aqueducs B3, 535 Route des Lucioles, 06560 Valbonne, France), including its affiliates and successors. "Service" refers to the suite of software applications provided by the Company. Capitalized terms not otherwise defined in this Policy have the meaning given to them in the Terms of Service.
The Company may update this Acceptable Use Policy from time to time. Your continued use of the Service constitutes your acceptance of the updated document.
1. Illegal and harmful activities
1.1 Compliance with laws. You must use the Service strictly in accordance with applicable laws. You must not use the Service to (i) conduct fraudulent activities, (ii) distribute defamatory material, or (iii) promote violence.
1.2 Harassment and abuse. You must not use the Service to harass any individual. You must not transmit content that is (i) obscene, (ii) hateful, or (iii) highly offensive.
1.3 Intellectual property violations. You must respect the intellectual property rights of others. You must not upload or share content if you lack the necessary rights to do so.
1.4 Export compliance. You must not access the Service from a jurisdiction subject to economic sanctions by the European Union or the United States. You represent that you are not listed on any restricted party list maintained by these authorities.
2. Security and technical integrity
2.1 System security. You must not compromise the security of the Service. You must refrain from (i) probing the vulnerabilities of the Service, (ii) breaching authentication measures, or (iii) intercepting data not intended for you. However, this section does not prohibit good-faith security testing conducted strictly in accordance with the rules of our official bug bounty program, provided this testing is clearly identified as part of this program.
2.2 Malicious code. You must not distribute malicious software through the Service. This prohibition includes (i) viruses, (ii) worms, (iii) trojan horses, (iv) corrupted files, or (v) any other similar software, program, or prompt intended to damage the operation of the Service or another third party.
2.3 Reverse engineering. You must not attempt to extract the source code of the Service. You must refrain from (i) reverse engineering the Service, (ii) decompiling the software, or (iii) disassembling the application, except to the extent expressly permitted by mandatory applicable law.
2.4 Sensitive data. You must refrain from submitting highly sensitive personal information to the Service. This includes (i) financial account numbers, (ii) payment card industry data subject to PCI-DSS, (iii) protected health information subject to HIPAA or similar applicable health privacy regulations, and (iv) government-issued identification numbers.
2.5 Account sharing. You must not share your individual authentication credentials with any other person. You must access the Service using strictly your own designated account.
2.6 Artificial intelligence. You must not use the artificial intelligence features of the Service to (i) generate unlawful content, (ii) circumvent copyright protections, (iii) intentionally mislead others regarding the origin of the generated content, or (iv) make automated decisions that produce significant individual, legal, financial, or systemic effects without appropriate human oversight. You acknowledge that outputs generated by AI Features may be (i) inaccurate, (ii) incomplete, (iii) inappropriate, or (iv) similar to outputs generated for other customers.
3. Resource usage and abuse
3.1 Fair usage. You must use the Service in a manner that does not unreasonably burden the infrastructure of the Company. You must not engage in (i) unauthorized load testing, (ii) denial-of-service attacks, or (iii) automated scraping of the Service.
3.2 Circumvention of limits. You must respect the technical limitations enforced by the Service. You must not bypass mechanisms designed to (i) limit your usage, (ii) restrict your access to specific features, or (iii) enforce billing quotas.
3.3 Unsolicited communications and impersonation. You must not use the Service to (i) transmit unsolicited commercial messages, (ii) distribute deceptive content, (iii) conduct phishing or social engineering attacks, or (iv) spoof the identity of the Company or any other individual.
3.4 Competitive intelligence. You must not access the Service to (i) build a competitive product, (ii) reverse engineer our feature parity, or (iii) publicly share performance benchmarks without the explicit prior written consent of the Company.
4. Third-Party Platforms
4.1 Platform compliance. The Service integrates with various Third-Party Platforms (such as Atlassian). When using the Service within or alongside a Third-Party Platform, you must comply with the terms of service of that specific platform.
4.2 Disruption of platforms. You must not use the Service to degrade the performance or stability of any Third-Party Platform.
5. Enforcement
5.1 Suspension of access. The Company reserves the right to suspend your access to the Service if you violate this Acceptable Use Policy.
5.2 Customer responsibility. The Company may report any violation of this Acceptable Use Policy to the Customer that authorized your access. The Customer retains the ultimate responsibility for your actions under the Terms of Service.
5.3 Reporting to platforms. The Company reserves the right to report any severe violation of this Policy to the relevant Third-Party Platform administrators or to law enforcement authorities.
5.4 Content removal. The Company acts as a business-to-business service provider and relies on the Customer to manage its users. However, the Company reserves the right to remove or disable access to any content that violates this Policy. The Company will typically coordinate with the Customer to address violations, but may act immediately without prior notice if required by law or to protect the Service.
6. Contact Information
If you have any questions about this Policy, please contact the Company through our support website.
[End of Policy]