View Archived Versions


Effective May 19, 2016

General Usage Limitations:

Use of the Service (as defined in the Agreement) is limited to use for internal business purposes in accordance with theapplicable terms of service or subscription agreement entered into between the parties (the “Agreement”). Customer shall not, directly or indirectly, use the CloudLock Services as follows:

  1. i) to disassemble, decompile, reverse engineer, recreate or use any other means to attempt to discover any source code, algorithms or trade secrets underlying the Service (except and only to the extent these restrictions are expressly prohibited by applicable statutory law); (ii) to encumber, sublicense, transfer, distribute, rent, lease, time-share or use the Service in any service bureau arrangement or otherwise for the benefit of any third party without the prior written consent of CloudLock; (iii) in a manner that imposes or may impose (as determined by CloudLock in its sole discretion) an unreasonable or disproportionately large load on the infrastructure of CloudLock (or its third party providers) or beyond the limits of licensed usage (including without limitation the Service specific usage limitations below); (iv) in a manner that interferes or attempt to interfere with the proper working of the Service or any activities conducted on the Service; (v) to bypass any privacy settings or measures used to prevent or restrict access to the Service (or other accounts, computer systems or networks connected to the Service); (vi) run mail list, Listserv, any form of auto-responder or “spam” on the Service; (vii) to use manual or automated software, devices, robot, spider, or other processes to “crawl” or “spider” or to retrieve, index, “scrape”, “data mine” or in any way gather information, content or other materials from the Service in an unauthorized manner or reproduce or circumvent the navigational structure or presentation of the Service; (viii) for purposes other than its intended use as a cloud security solution or in a manner that is inconsistent with the customary use of the Service; (ix) to store or transmit viruses or malicious code; (x) to attempt to gain unauthorized access to the CloudLock Service or their related systems or networks; (xi) in a manner which interferes with or disrupt the integrity or performance of the Service; (xii) use or allow the transmission, transfer, export, re-export or other transfer of any software, technology or information forming a part of the Service in violation of any export control or other laws and regulations of the United States or any other relevant jurisdiction; or (xiii) in any way that is unlawful, illegal, fraudulent or harmful.

If you are in material breach of your obligations as set forth in this CloudLock Use Policy, in addition to any of its other rights or remedies set forth in the Agreement or otherwise available at law or in equity, CloudLock reserves the right to immediately suspend use of the Service without liability until such breach is cured.

Service Specific Usage Limitations:


  1. Except as provided below, the number of “Users” is based on the total number of individual users authorized to use the applicable cloud application(s) being monitored by the CloudLock service. For example, if Customer has 100 unique individuals authorized to use its Google Apps applications, Customer must purchase a 100 User subscription for CloudLock for Google Apps. If Customer has purchased services for multiple applications (e.g. CloudLock for Google Apps for 100 Users and CloudLock for Salesforce for 200 Users), Customer’s subscription for the CloudLock Security Fabric or CloudLock Security Fabric Plus service must be for the higher number of Users (200 Users). For CloudLock for AWS Console, the number of “Users” reflected in the applicable order means the total number of Users authorized to access the AWS Console. For this purpose, a “User” is a unique identity recognized by AWS services and applications and can be an individual, system or application authorized to access the AWS Console, including root, IAM, and federated users (i.e. users external to AWS who are authorized to access the AWS Console).
  2. An “Active Policy” is a predefined policy that comes with the service or a customer created policy that is flagged as active within the service.
  3. “Retroactive Monitoring” is the ability to assess Customer’s entire data set at-rest for policy violations including all historic available data objects in the applicable cloud application.
  4. A “Data Asset” is a single discrete file, document or other object within the applicable cloud application environment.
  5. The Test Domain is authorized for up to the lesser of 1,000 Users in the aggregate or the number of User licenses purchased for the CloudLock Security Fabric Plus service.

Experience a Live Demo

See the CloudLock CASB & cloud cybersecurity solution in action from one of our cloud security experts

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser