Acceptable Use Policy

Life Load
Effective Date: December 5, 2025
Last Updated: December 5, 2025


Introduction

This Acceptable Use Policy ("AUP") governs your use of the Life Load mobile application ("App"), the Life Load synchronization relay service ("Relay"), the Life Load email processing service ("Email Bridge"), and all associated infrastructure (collectively, "Services"). This AUP is incorporated into and forms part of our Terms and Conditions.

By using any of the Services, you agree to comply with this AUP. This policy exists to ensure a positive experience for all users, protect our infrastructure, maintain service availability, and comply with applicable laws.


1. General Principles

You agree to use the Services:


2. Account and Resource Limits

2.1 Per-User Limits

Resource Limit Notes
User accounts 1 per person Multiple accounts prohibited
Family Spaces owned 1 per account You can be a member of others
Email aliases 1 active per Family Space Rotate anytime
Devices per account 5 Reasonable personal use

2.2 Family Space Limits

Resource Free Tier Premium Tier
Core Carers (including owner) 2 4
Supporters 3 Unlimited
Child profiles 5 20
Pending join requests 5 10
Trial period 30 days N/A
Grace period after expiry 7 days N/A

2.3 Content Limits

Content Type Limit
Task/event title length 200 characters
Task/event notes 2,000 characters
Location name length 100 characters
Voice input length 500 characters
Email body (processed) 2,000 characters (text) / 5,000 characters (HTML)
File attachment size 10 MB per file
Total attachments per item 50 MB
Saved places 100 per account
DoD templates 50 per Family Space
Steps per DoD template 20

3. Infrastructure Usage Limits

3.1 Location Search Quotas

The App uses location search services (Google Places API on Android, Apple MapKit on iOS). These services have associated costs, and we implement fair use limits.

Daily Limits:

Action Daily Limit Notes
Location searches 50 per day Per user account
Geocoding requests 100 per day Address lookups
Place detail refreshes 25 per day Refreshing cached data

Fair Use Guidelines:

3.2 Relay Service Limits

The Relay service enables real-time synchronization between Family Space members.

Action Limit Notes
Sync messages 1,000 per hour Per Family Space
Message size 64 KB Per sync message
Reconnection attempts 10 per minute Before exponential backoff
Concurrent connections 1 per device Per Family Space
WebSocket idle timeout 5 minutes Reconnect required after
Maximum connection duration 24 hours Forced reconnect

Prohibited Relay Usage:

3.3 Email Bridge Limits

The Email Bridge processes emails forwarded to your Life Load email alias.

Resource Limit Notes
Emails processed 100 per day Per email alias
Email size (total) 25 MB Including all attachments
Attachments per email 10 Extracted automatically
Attachment size (inline) 256 KB Embedded in message
Attachment size (chunked) 10 MB Downloaded separately
Email rules 20 per alias User-defined rules
Rule conditions per rule 5 From/subject/body matches
Attachment retention 7 days Auto-deleted after

Prohibited Email Bridge Usage:

3.4 Voice Input Limits

Resource Limit Notes
Voice command queue 10 commands Oldest dropped when full
Continuous wake word listening Foreground only Battery optimization
Speech recognition Device/OS limits apply Platform-dependent
Voice processing timeout 30 seconds Per utterance

4. Network and System Security

4.1 Prohibited Network Activities

You shall NOT:

(a) Denial of Service (DoS/DDoS): Launch or participate in denial of service attacks, distributed denial of service attacks, or any action intended to disrupt, disable, or degrade the availability of the Services, including:

(b) Unauthorized Access: Attempt to gain unauthorized access to:

(c) Network Attacks: Engage in:

(d) Scanning and Probing: Conduct unauthorized:

(e) Traffic Manipulation:

4.2 Encryption and Security Mechanisms

You shall NOT:

(a) Cryptographic Attacks:

(b) Authentication Bypass:

(c) Key Compromise:

(d) Encryption Enforcement:

4.3 Security Research Policy

We value responsible security research. If you discover a security vulnerability:

Do:

Don't:

We commit to:


5. Prohibited Content

You may NOT use the Services to create, store, upload, transmit, process, or share content that:

5.1 Illegal Content

5.2 Harmful Content

5.3 Infringing Content

5.4 Offensive Content

5.5 Deceptive Content

5.6 Privacy-Violating Content


6. Prohibited Activities

6.1 Reverse Engineering and Exploitation

You shall NOT:

(a) Reverse Engineering:

(b) Protocol Analysis:

(c) Exploitation:

(d) Data Extraction:

6.2 Automation and Bots

You shall NOT:

Exception: Approved integrations (e.g., calendar sync, Siri Shortcuts) that we explicitly support are permitted.

6.3 Account Abuse

You shall NOT:

6.4 Subscription and Payment Abuse

You shall NOT:

6.5 Commercial Misuse

You shall NOT:


7. Family Space Conduct

7.1 Member Responsibilities

When participating in a Family Space:

7.2 Owner Responsibilities

As a Family Space owner, you are responsible for:

7.3 Prohibited Family Space Activities


8. Email-to-Task Conduct

8.1 Intended Use

The Email Bridge is designed to convert legitimate personal and family-related emails into tasks. Permitted uses include:

8.2 Prohibited Email Uses

8.3 Attachment Restrictions

Attachments processed through the Email Bridge must:


9. Enforcement

9.1 Monitoring

We monitor usage patterns, not the content of your tasks, events, or Family Space data. Specifically, we may analyze:

In normal operation, our servers do not see your Family Space content or local data in plaintext form. Family Space updates are encrypted on your device before being sent to our relay infrastructure, which forwards encrypted blobs plus routing metadata and does not inspect or store your Family Space content in plaintext. We have not built administrative tools that allow our staff to view decrypted Family Space content.

For the Email-to-Task feature, our Cloudflare-based email bridge briefly processes incoming emails in plaintext in memory in order to parse them, apply your rules, and handle attachments, then encrypts the resulting email message with your device’s public key before storage or forwarding through the relay. After this encryption step, only your device (which holds the corresponding private key) can decrypt the stored email content. Large attachments may be temporarily stored by our infrastructure providers to allow your device to download them, as described in our Privacy Policy.

Logs and telemetry from our Services record technical metadata such as anonymous identifiers, timestamps, message counts, attachment counts, and HTTP status codes. We do not log the content of your Family Space sync messages, tasks, events, or email subjects and bodies. We may access and disclose limited metadata, logs, and other non-content information we hold in readable form (for example, IP addresses, usage counts, or error messages) when required by law, with your consent, or to investigate credible reports of AUP violations, in line with our Privacy Policy.

9.2 Automated Enforcement

Our systems automatically enforce certain limits:

Hitting these limits results in temporary denial of the specific action, not account penalties.

9.3 Manual Enforcement

If we determine you have violated this AUP, we may take the following actions:

Action Description
Warning Notification of the violation with guidance on compliance
Feature Restriction Temporary or permanent restriction of specific features
Rate Limit Reduction Reduced quotas or stricter rate limits
Temporary Suspension Account suspended for a specified period
Permanent Termination Account permanently terminated
Legal Action Referral to law enforcement or civil action

9.4 Severity Guidelines

Severity Examples Typical Response
Minor Slightly exceeding soft limits, accidental rule violations Warning
Moderate Repeated minor violations, account sharing, quota manipulation Feature restriction or temporary suspension
Severe Harassment, infringing content, fraud, systematic abuse Account termination
Critical Illegal content (especially CSAM), malware distribution, attacks on infrastructure Immediate termination + law enforcement referral

9.5 Appeals

If you believe enforcement action was taken in error:

  1. Email appeals@lifeload.app within 30 days of the action
  2. Include your account information and detailed circumstances
  3. Provide any evidence supporting your appeal
  4. We will review and respond within 14 days
  5. You may escalate to legal@lifeload.app if unsatisfied
  6. Our final decision on appeal is binding

10. Reporting Violations

10.1 How to Report

Security Issues: security@lifeload.app (see Section 4.3)

AUP Violations: abuse@lifeload.app

Legal/DMCA: legal@lifeload.app

Include in your report:

10.2 Response Timeline

10.3 Good Faith Reporting

Reports made in good faith are protected. We will not retaliate against users who report violations in good faith. However, false, malicious, or bad-faith reports may result in action against the reporter.


11. Fair Use Guidelines

11.1 Location Services

Do:

Don't:

11.2 Relay Sync Services

Do:

Don't:

11.3 Email Processing

Do:

Don't:


12. Quota Exceeded Behavior

12.1 Soft Limits

When approaching a soft limit:

12.2 Hard Limits

When reaching a hard limit:

12.3 Abuse Detection

If automated systems detect abuse patterns:


13. Data Retention After Violations

13.1 Account Termination

Upon account termination for AUP violations:

13.2 Evidence Preservation

For serious violations, we may:


14. Changes to This Policy

We may update this AUP from time to time. When we make changes:


15. Contact Information

Purpose Contact
Policy Questions legal@lifeload.app
Report Violations abuse@lifeload.app
Security Issues security@lifeload.app
General Support support@lifeload.app
Appeals appeals@lifeload.app

16. Summary: Quick Reference

✅ Do

❌ Don't

This Acceptable Use Policy is effective as of December 5, 2025.

Questions?

For legal enquiries, email us at legal@lifeload.app

For general support, contact support@lifeload.app