harness logo
Product
DevOps Modernization
Accelerate innovation velocity with a modern DevOps toolchain.
Continuous Delivery & GitOps
Continuous Delivery & GitOps
NEW
Continuous Integration
Continuous Integration
NEW
Internal Developer Portal
Internal Developer Portal
NEW
Infrastructure as Code Management
Infrastructure as Code Management
NEW
Database DevOps
Database DevOps
NEW
Artifact Registry
Artifact Registry
NEW
Cloud Development Environments
Cloud Development Environments
NEW
Quality Assurance & Resilience
Build and deploy reliable applications that scale with confidence.
Feature Management & Experimentation
Feature Management & Experimentation
NEW
Chaos Engineering
Chaos Engineering
NEW
AI Test Automation
AI Test Automation
NEW
Incident Response
Incident Response
NEW
Security & Governance
Governance and security at every stage of the SDLC - from design to runtime.
Application Discovery & Risk Assessment
Application Discovery & Risk Assessment
NEW
Application Security Testing
Application Security Testing
NEW
Security Testing Orchestration
Security Testing Orchestration
NEW
Supply Chain Security
Supply Chain Security
NEW
Application Runtime Protection
Application Runtime Protection
NEW
Cost & Productivity Optimization
Optimize cloud spend, resource utilization, and developer productivity.
Cloud Cost Management
Cloud Cost Management
NEW
Software Engineering Insights
Software Engineering Insights
NEW
Harness AI
Leverage enterprise-ready AI assistants to eliminate toil across the entire software delivery life cycle.
AI DevOps Agent
AI DevOps Agent
free
AI Code Agent
AI Code Agent
free
CustomersOpen SourcePricing
Learn
Developer
Documentation
API Reference Docs
Comparison Guide
Developer Hub
Commitment to Open Source
Engineering Blog
Community
RESOURCES
Ebooks
Blog
Case Studies
DevOps Academy
Training
Certifications
Harness Support
Professional Services
Events
Upcoming events
On-demand
Webinars
Solutions
DevOps
Secure Software Delivery
FinOps Excellence
Engineering Excellence
The State of Software Delivery Report 2025: Beyond CodeGen: The Role of AI in the SDLC | Watch On-demand
Company
About us
Careers
Security
Press & News
Legal
Partners
Contact us
Harness Press Kit
View all
Contact UsContact us
Trending searches
Products:
Continuous Integration
Continuous Delivery & GitOps
Chaos Engineering
Supply Chain Security
Internal Developer Portal
Explore Business Values:
DevOps Modernization
Secure Software Delivery
Cloud Cost Optimizaton
Developer Experience
Contact us
Get started
Sign upSign in
Harness Social Media Sweepstakes
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Engineering X Terms of Use
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Harness License Unit Definitions
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Subscription Terms
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Harness Product-Specific Terms
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Privacy Statement
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Website Terms Of Use
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Harness Subprocessors 
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Harness Acceptable Use Policy
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Harness AI Data Privacy
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Service Packages
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Vendor Code of Conduct
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
Responsible Sourcing Policy
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
UK Modern Slavery Statement
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center
DevOps Essentials Usage Terms
Do Not Sell or Share My Personal Information
Exercise Your Data Rights
Trust Center

Harness Acceptable Use Policy

As of Mar 31, 2023

This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“you”, “your”, “yours”, or “Customer”) using any websites, products and services (collectively, the “Software”) provided by Harness Inc. or any of its affiliates (collectively, “Harness”) and any user of any software application or service made available by Customer that interfaces with the Software (“User”). The prohibited conduct in this AUP is not exhaustive. Customer is responsible for its Users’ compliance with this AUP. If Customer or any User violates this AUP, Harness may suspend Customer’s use of the Software. This AUP may be updated by Harness from time to time upon reasonable notice, which may be provided via Customer’s account, e-mail, or by posting an updated version of this AUP at https://harness.io/legal/AUP.

1. No Inappropriate Content or Users.

Do not use the Software to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, or objectionable, including, but not limited to, content or communications which Harness determines:
1.a
is false or inaccurate; 
1.b
is hateful or encourages hatred or violence against individuals or groups; or 
1.c
could endanger public safety.
This prohibition includes use of the Software by a hate group. Customer and its Users are also prohibited from using the Software to promote, or enable the transmission of or access to, any prohibited content or communications described in this paragraph.

2. Prohibited Activities.

Do not use the Software to engage in or encourage any activity that is illegal, deceptive, harmful, a violation of others’ rights, or harmful to Harness’s business operations or reputation, including:
2.a
Violations of Laws. Violating laws, regulations, governmental orders, or industry standards or guidance in any applicable jurisdiction (collectively, “Applicable Laws”). This includes i) violating Applicable Laws requiring (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications, or ii) (h) using the Software in violation of any applicable laws or regulations (including any export laws, restrictions, national security controls and regulations) or outside of the license scope set forth in Section 2.1 (License Grant) of the Agreement; 
2.b
Configure the Software to collect or transmit any Prohibited Data, or transmit to Harness any Prohibited Data.  “Prohibited Data” means: (a) special categories of data enumerated in European Union Regulation 2016/679, Article 9(1) or any successor legislation; (b) patient, medical, or other protected health information regulated by the Health Insurance Portability and Accountability Act (as amended and supplemented) (“HIPAA”); (c) credit, debit, or other payment card data or financial account information, including bank account numbers or other personally identifiable financial information; (d) social security numbers, driver’s license numbers, or other government identification numbers; (e) other information subject to regulation or protection under specific laws such as the Children’s Online Privacy Protection Act or Gramm-Leach-Bliley Act (“GLBA”) (or related rules or regulations); or (f) any data similar to the above protected under foreign or domestic laws.
2.c
Disclose or, except as reasonably necessary to use the Software, use any non-public information regarding Harness or the Software;
2.d
Use the Software in support of any nuclear proliferation, chemical weapon, biological weapon or missile proliferation activity; 
2.e
Interference with the Software. Interfering with or otherwise negatively impacting any aspect of the Software or any third-party networks that are linked to the Software;
2.f
Publish the results of any benchmarking tests run on the Software; 
2.g
Use the Software to

  • store, download or transmit infringing, libelous, or otherwise unlawful or tortious material, or malicious code or malware; 
  • engage in phishing, spamming, denial-of-service attacks or other fraudulent or criminal activity; 
  • interfere with or disrupt the integrity or performance of third party systems, or the Software or data contained therein;
  • perform, or engage any third party to perform, authenticated or unauthenticated penetration testing, vulnerability assessments or other security assessments on the SaaS deployment of the Software;

2.h Falsification of Identity or Origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications; 
2.i Create a Harness customer account, access or use the Software in order to:

  • monitor the Software’s availability, performance, or functionality for competitive purposes; 
  • copy ideas, features, functions, or graphics;
  • develop competing products or Software; or 
  • perform any other form of competitive analysis, as determined by Harness in its sole discretion;

2.j Using, or permitting direct or indirect access to, the Software for any form of excessive automated bulk activity such as spamming; inauthentic interactions, such as the creation or use of fake accounts and automated inauthentic activity; or mining or demonstrating proof-of-work or other proof by use of resources for any cryptocurrency or blockchain.

3. No Service Integrity Violations.

Do not violate the integrity of the Software, including:
3.1 Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Software;
3.2 Security Vulnerabilities. Finding security vulnerabilities to exploit the Software or attempting to bypass any security mechanism or filtering capabilities; 
3.3 Disabling the Software. Any denial of service (DoS) attack on the Software or any other conduct that attempts to disrupt, disable, or overload the Software;
3.4 Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Software;
3.5 Unauthorized Access. Attempting to gain unauthorized access to the Software or Harness’s systems.

4. Data Safeguards.

Customer is responsible for determining whether the Software offers appropriate safeguards for Customer’s use of the Software, including, but not limited to, any safeguards required by Applicable Laws, prior to transmitting or processing, or prior to permitting Users to transmit or process, any data or communications via the Software.

5. Notices and Reporting.

Violations of this AUP, including any prohibited content or communications, may be reported to legalnotices@harness.io. Customer agrees to immediately report any violation of this AUP to Harness and provide cooperation, as requested by Harness, to investigate and/or remedy that violation.

®

Sign up for Harness Updates

Subscribe to our newsletter to receive the latest Harness updates in your inbox

Thank you for subscribing to our newsletter. We will be sending you latest updates in your inbox..

By submitting this form, you acknowledge and agree that Harness Inc will process your personal information in accordance with the Privacy Statement.

the State of

Software
Delivery
2025

View the full report
Platform
Continuous Delivery & GitOpsContinuous IntegrationFeature Management & ExperimentationInfrastructure as Code ManagementChaos EngineeringIncident Response NEWService Reliability ManagementDatabase DevOps NEWArtifact Registry NEWInternal Developer PortalSoftware Engineering InsightsCloud Development Environments NEWSecurity Testing OrchestrationSupply Chain SecurityCloud Cost Management
Harness AI
AI DevOps AgentAI Test Automation
AI Code Agent
free
Pricing
View plans
For Developers
Documentation
Developer Hub
Open Source
Commitment to Open Source
Community
API Reference DocsEngineering Blog
Harness University
Resources
BlogComparison GuideCollateralCustomersDevOps AcademyEbooks
Engineering Maturity Assessment
On-demand VideosWebinars
Support
Training
Professional Services
Company
About UsPress & NewsPartnersCareersContact UsHarness Press KitTrademark PolicySecurityLegal
© 2025 Harness Inc.
Subscription TermsWebsite Terms of UsePrivacy Statement
Opt Out
Do Not Sell / Share My Personal Information
Cookie Settings
Github icon
LinkedIn icon
Facebook icon
Instagram icon
Twitter icon
© 2025 Harness Inc.