Working with files
Connecting to data sources
Coding and analysis tools
Security and privacy
Deepnote for education
Acceptable use policy
Effective date: February 9, 2023
Deepnote is a collaborative data notebook trusted by the world’s best data teams. We’re on a mission to radically improve how teams think, explore and decide together. In order to do this, we must ensure that our product and services continue to operate smoothly, which includes protection against misuse or abuse by our users.
We've developed this Acceptable Use Policy to clarify what we mean when we say "misuse" or "abuse" and to assist us in identifying such offenses and responding appropriately. In accordance with this policy, we reserve the right to suspend or terminate any accounts that violate these guidelines. Even if actions are not explicitly included in the policy, Deepnote remains the right (in its sole discretion) to suspend or terminate any accounts that have violated this Acceptable Use Policy with or without notice.
You may not, and you may not allow your users or any third party to, use Deepnote to display, store, process or transmit, or permit use of the SaaS to display, store, process or transmit, any of the following:
- Material that infringes or misappropriates a third party’s intellectual property or proprietary rights
- Hate-related or violent material, or material advocating discrimination against individuals or groups
- Obscene, excessively profane or otherwise offensive or objectionable material
- Material that enables, advocates or advances criminal hacking or phishing
- Material related to illegal drugs or paraphernalia
- Malicious or unlawful code, such as viruses, worms, time bombs, Trojan horses and other harmful or malicious files, scripts, agents or programs
- Material that violates, encourages or furthers conduct that would violate any applicable laws, including any criminal laws, or any third-party rights, including publicity or privacy rights
- Generating or facilitating unsolicited commercial email (spam).
- Hacking, tampering, reverse-engineering or compromising the integrity of any systems. This prohibition does not apply to ethical security researchers working in accordance with our bug bounty policy to find vulnerabilities in our systems. Any such behavior must not result in degradation of service for other users of the platform.
- Overwhelming or attempting to overwhelm our infrastructure by imposing an unreasonably large load on our systems.
- Engage in cryptocurrency mining/farming or any similar behavior.
- Monitoring or crawling of any system that impairs or disrupts the system being monitored or crawled, or any other large scale harvesting or scraping .
- Operating open proxies, open mail relays, open recursive domain name servers, Tor exit nodes, or other similar network services.
- Interfering with the proper functioning of any system, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, flooding techniques, or conducting a denial of service (“DoS”) attack.
- Use Deepnote primarily as a remote desktop environment.
HIPAA and working with PHI
- Deepnote permits the processing of PHI data under the condition of a signed BAA agreement with Deepnote.
- Do not use metadata, namely project names and notebook names, to store PHI.