Acceptable Use Policy
Life Load
Effective Date: December 5, 2025
Last Updated: December 5, 2025
Introduction
This Acceptable Use Policy ("AUP") governs your use of the Life Load mobile application
("App"),
the Life Load synchronization relay service ("Relay"), the Life Load email processing service
("Email Bridge"),
and all associated infrastructure (collectively, "Services"). This AUP is incorporated into and forms
part of our
Terms and Conditions.
By using any of the Services, you agree to comply with this AUP. This policy exists to ensure a positive
experience
for all users, protect our infrastructure, maintain service availability, and comply with applicable laws.
1. General Principles
You agree to use the Services:
- Lawfully: In compliance with all applicable laws, regulations, and ordinances in your
jurisdiction
- Ethically: In a manner that respects the rights and dignity of others
- Responsibly: Without causing harm to our systems, other users, or third parties
- Fairly: Without attempting to gain unfair advantage or abuse our services
- Securely: Without compromising the security or integrity of the Services or other users'
data
2. Account and Resource Limits
2.1 Per-User Limits
| Resource |
Limit |
Notes |
| User accounts |
1 per person |
Multiple accounts prohibited |
| Family Spaces owned |
1 per account |
You can be a member of others |
| Email aliases |
1 active per Family Space |
Rotate anytime |
| Devices per account |
5 |
Reasonable personal use |
2.2 Family Space Limits
| Resource |
Free Tier |
Premium Tier |
| Core Carers (including owner) |
2 |
4 |
| Supporters |
3 |
Unlimited |
| Child profiles |
5 |
20 |
| Pending join requests |
5 |
10 |
| Trial period |
30 days |
N/A |
| Grace period after expiry |
7 days |
N/A |
2.3 Content Limits
| Content Type |
Limit |
| Task/event title length |
200 characters |
| Task/event notes |
2,000 characters |
| Location name length |
100 characters |
| Voice input length |
500 characters |
| Email body (processed) |
2,000 characters (text) / 5,000 characters (HTML) |
| File attachment size |
10 MB per file |
| Total attachments per item |
50 MB |
| Saved places |
100 per account |
| DoD templates |
50 per Family Space |
| Steps per DoD template |
20 |
3. Infrastructure Usage Limits
3.1 Location Search Quotas
The App uses location search services (Google Places API on Android, Apple MapKit on iOS). These services have
associated
costs, and we implement fair use limits.
Daily Limits:
| Action |
Daily Limit |
Notes |
| Location searches |
50 per day |
Per user account |
| Geocoding requests |
100 per day |
Address lookups |
| Place detail refreshes |
25 per day |
Refreshing cached data |
Fair Use Guidelines:
- Results are cached locally for 30 days to reduce API usage
- Repeated searches for the same term use cached results
- Excessive or automated search patterns may trigger rate limiting
- Location search is for legitimate task/event creation only
3.2 Relay Service Limits
The Relay service enables real-time synchronization between Family Space members.
| Action |
Limit |
Notes |
| Sync messages |
1,000 per hour |
Per Family Space |
| Message size |
64 KB |
Per sync message |
| Reconnection attempts |
10 per minute |
Before exponential backoff |
| Concurrent connections |
1 per device |
Per Family Space |
| WebSocket idle timeout |
5 minutes |
Reconnect required after |
| Maximum connection duration |
24 hours |
Forced reconnect |
Prohibited Relay Usage:
- Using the Relay for purposes other than Life Load app synchronization
- Attempting to connect to the Relay with unauthorized clients
- Flooding the Relay with messages or connection attempts
- Attempting to intercept, modify, or replay messages between other users
- Probing or scanning the Relay infrastructure
3.3 Email Bridge Limits
The Email Bridge processes emails forwarded to your Life Load email alias.
| Resource |
Limit |
Notes |
| Emails processed |
100 per day |
Per email alias |
| Email size (total) |
25 MB |
Including all attachments |
| Attachments per email |
10 |
Extracted automatically |
| Attachment size (inline) |
256 KB |
Embedded in message |
| Attachment size (chunked) |
10 MB |
Downloaded separately |
| Email rules |
20 per alias |
User-defined rules |
| Rule conditions per rule |
5 |
From/subject/body matches |
| Attachment retention |
7 days |
Auto-deleted after |
Prohibited Email Bridge Usage:
- Using the Email Bridge for general email service or forwarding
- Signing up for mailing lists, newsletters, or bulk email services
- Using the alias for account registration on services you don't intend to use
- Forwarding spam, bulk mail, or unsolicited commercial email
- Forwarding emails containing prohibited content (see Section 5)
- Sharing your email alias publicly or with untrusted sources
- Attempting to overwhelm the bridge with high email volumes
3.4 Voice Input Limits
| Resource |
Limit |
Notes |
| Voice command queue |
10 commands |
Oldest dropped when full |
| Continuous wake word listening |
Foreground only |
Battery optimization |
| Speech recognition |
Device/OS limits apply |
Platform-dependent |
| Voice processing timeout |
30 seconds |
Per utterance |
4. Network and System Security
4.1 Prohibited Network Activities
You shall NOT:
(a) Denial of Service (DoS/DDoS): Launch or participate in denial of service attacks,
distributed denial of service attacks, or any action intended to disrupt, disable, or degrade the availability
of the Services, including:
- Flooding the Relay with connection requests
- Sending excessive sync messages
- Overwhelming the Email Bridge with emails
- Exhausting API quotas through automated requests
- Coordinated attacks from multiple accounts or devices
(b) Unauthorized Access: Attempt to gain unauthorized access to:
- Other users' accounts, data, or Family Spaces
- Administrative interfaces or internal systems
- Encryption keys, authentication tokens, or credentials
- Backend services, databases, or infrastructure
- Cloudflare Workers, KV stores, or Durable Objects
(c) Network Attacks: Engage in:
- Man-in-the-middle attacks on Relay connections
- WebSocket hijacking or injection
- DNS spoofing or cache poisoning targeting our domains
- BGP hijacking or route manipulation
- SSL/TLS stripping or downgrade attacks
(d) Scanning and Probing: Conduct unauthorized:
- Port scanning or network enumeration
- Vulnerability scanning or penetration testing
- Fuzzing or automated security testing
- Service fingerprinting or version detection
(e) Traffic Manipulation:
- Intercepting, modifying, or replaying network traffic
- Injecting malicious content into data streams
- Spoofing IP addresses, headers, or identities
- Bypassing rate limits through proxy rotation
4.2 Encryption and Security Mechanisms
You shall NOT:
(a) Cryptographic Attacks:
- Attempt to break, weaken, or circumvent encryption used by the Services
- Attempt to derive encryption keys through cryptanalysis
- Exploit weaknesses in random number generation
- Conduct timing attacks or side-channel analysis
- Attempt to forge, modify, or replay encrypted messages
(b) Authentication Bypass:
- Attempt to bypass authentication or authorization mechanisms
- Forge authentication tokens or session identifiers
- Exploit race conditions in authentication flows
- Brute-force passwords, invite codes, or tokens
(c) Key Compromise:
- Attempt to extract private keys from devices or servers
- Share, distribute, or sell encryption keys
- Retain or use keys after leaving a Family Space
- Attempt to recover keys from backups you don't own
(d) Encryption Enforcement:
- Attempt to bypass, disable, or weaken the encryption mechanisms used by the Services (including Family Space
sync and the Email Bridge).
4.3 Security Research Policy
We value responsible security research. If you discover a security vulnerability:
Do:
- Report vulnerabilities to security@lifeload.app promptly
- Provide sufficient detail to reproduce the issue
- Allow reasonable time (90 days) for remediation before disclosure
- Delete any data obtained during research after reporting
Don't:
- Access, modify, or delete data belonging to other users
- Degrade service availability during testing
- Use automated scanning tools without prior written approval
- Publicly disclose vulnerabilities before they are fixed
- Demand payment or threaten disclosure
We commit to:
- Acknowledging receipt within 48 hours
- Providing status updates at least every 14 days
- Not pursuing legal action against good-faith researchers
- Crediting researchers (if desired) after remediation
5. Prohibited Content
You may NOT use the Services to create, store, upload, transmit, process, or share content that:
5.1 Illegal Content
- Violates any applicable law, regulation, or legal obligation
- Facilitates illegal activities or promotes unlawful conduct
- Contains or distributes child sexual abuse material (CSAM)
- Promotes terrorism, violence, or criminal activity
- Violates export control or sanctions laws
- Constitutes or facilitates money laundering or fraud
5.2 Harmful Content
- Contains malware, viruses, ransomware, spyware, or malicious code
- Is designed to damage, disable, or impair any system or device
- Contains phishing attempts, social engineering schemes, or credential harvesting
- Promotes self-harm, suicide, or eating disorders
- Glorifies or incites violence against individuals or groups
- Constitutes or facilitates stalking, harassment, or intimidation
5.3 Infringing Content
- Infringes copyrights, trademarks, patents, or other intellectual property rights
- Contains pirated software, media, games, books, or other protected content
-
Shares content obtained through unauthorized means, including:
- Peer-to-peer (P2P) networks (torrents, etc.) without proper licensing
- Cracked or patched software
- Ripped or stream-captured media
- Leaked or stolen content
- Circumvents digital rights management (DRM), copy protection, or access controls
- Uses trademarks, brands, or logos without authorization
5.4 Offensive Content
- Contains hate speech, discrimination, or harassment based on race, ethnicity, national origin, religion,
gender, gender identity, sexual orientation, disability, age, or other protected characteristics
- Is defamatory, libelous, or designed to harm someone's reputation
- Contains pornographic, sexually explicit, or adult material
- Is obscene, vulgar, or gratuitously offensive
- Bullies, intimidates, threatens, or demeans any individual
5.5 Deceptive Content
- Is false, misleading, or intended to deceive
- Impersonates another person, entity, or organization
- Misrepresents your identity, credentials, or affiliation
- Contains fraudulent schemes, scams, or pyramid/MLM promotions
- Spreads misinformation that could cause harm
5.6 Privacy-Violating Content
- Contains personal information about others without their consent
- Shares private communications without authorization
- Doxes or exposes private information about individuals
- Violates confidentiality obligations or NDAs
- Collects, harvests, or aggregates data about other users
6. Prohibited Activities
6.1 Reverse Engineering and Exploitation
You shall NOT:
(a) Reverse Engineering:
- Reverse engineer, decompile, disassemble, or decrypt the App or any component
- Extract, reconstruct, or derive source code, algorithms, data structures, or protocols
- Analyze bytecode, binary code, or memory contents to understand implementation
- Create derivative works, clones, or competing products based on reverse-engineered knowledge
(b) Protocol Analysis:
- Reverse engineer the Relay synchronization protocol
- Reverse engineer the Email Bridge processing logic
- Create unauthorized clients or bots that connect to our infrastructure
- Intercept or analyze network traffic to derive protocol specifications
(c) Exploitation:
- Exploit vulnerabilities, bugs, glitches, or errors in the Services
- Use exploits to gain unauthorized access, privileges, or capabilities
- Develop, distribute, or sell exploits targeting the Services
- Retain access after a vulnerability has been patched
(d) Data Extraction:
- Scrape, harvest, or systematically collect data from the Services
- Extract datasets for machine learning, analytics, or research without authorization
- Copy, export, or exfiltrate data in bulk
- Create databases or archives from extracted data
6.2 Automation and Bots
You shall NOT:
- Use bots, scripts, crawlers, spiders, or automated tools to access the Services
- Automate account creation, login, or any user interaction
- Generate artificial traffic, usage patterns, or load
- Circumvent rate limits, quotas, or usage restrictions through automation
- Use headless browsers, emulators, or instrumented clients for automated access
- Schedule or batch operations in ways that circumvent fair use limits
Exception: Approved integrations (e.g., calendar sync, Siri Shortcuts) that we explicitly
support are permitted.
6.3 Account Abuse
You shall NOT:
- Create multiple accounts for the same person
- Create accounts for others or on behalf of others
- Share, sell, transfer, rent, or lend your account
- Purchase, receive, or use accounts created by others
- Use another person's account without their explicit authorization
- Create accounts using false, misleading, or stolen identities
- Create accounts for fraudulent, testing, or competitive analysis purposes
6.4 Subscription and Payment Abuse
You shall NOT:
- Manipulate, exploit, or game free trials or promotional offers
- Create multiple accounts to obtain multiple free trials
- Use virtual cards, stolen payment methods, or fraudulent billing information
- Request refunds in bad faith or abuse chargeback mechanisms
- Circumvent payment requirements through any means
- Share Premium features with non-Premium users through workarounds
- Exploit regional pricing differences through VPNs or location spoofing
6.5 Commercial Misuse
You shall NOT:
- Use the Services for commercial purposes without written authorization
- Resell, sublicense, or redistribute the Services or access thereto
- Provide the Services to third parties as part of a commercial offering
- Use information obtained from the Services to build competing products
- Benchmark, compare, or evaluate the Services for competitive purposes
- Monetize access to the Services, your account, or any data therein
7. Family Space Conduct
7.1 Member Responsibilities
When participating in a Family Space:
- Only accept invitations from people you know and trust
- Respect the privacy of shared information
- Use shared features for their intended family/caregiving purpose
- Do not share invite codes publicly or with untrusted parties
- Report inappropriate behavior to the Family Space owner
- Leave a Family Space if you are no longer part of that family unit
7.2 Owner Responsibilities
As a Family Space owner, you are responsible for:
- Managing membership and access appropriately
- Vetting new members before approving join requests
- Removing members who violate this policy or are no longer appropriate
- Ensuring all shared content complies with this AUP
- Monitoring for abuse or inappropriate use within your Family Space
- Addressing disputes between members fairly
- Revoking access when relationships end
7.3 Prohibited Family Space Activities
- Creating Family Spaces for illegal or harmful purposes
- Creating fake Family Spaces to exploit features or quotas
- Using Family Spaces to harass, stalk, or monitor individuals without consent
- Sharing inappropriate content with or about minors
- Using Family Spaces to coordinate harmful, illegal, or unethical activities
- Joining Family Spaces under false pretenses
- Retaining access to Family Spaces you no longer have a legitimate reason to access
8. Email-to-Task Conduct
8.1 Intended Use
The Email Bridge is designed to convert legitimate personal and family-related emails into tasks. Permitted uses
include:
- Forwarding your own emails (bills, appointments, reminders) for task creation
- Setting up rules to automatically process emails you receive
- Connecting services that send you legitimate notifications
- Processing emails from schools, healthcare providers, or service providers
8.2 Prohibited Email Uses
- Using the email alias as a general-purpose email address
- Subscribing to spam, bulk mail, or mailing lists
- Using the alias for account signup on services unrelated to task management
- Forwarding emails containing prohibited content (see Section 5)
- Using the alias to collect, aggregate, or harvest data
- Sharing your alias publicly (social media, forums, public websites)
- Using the alias to receive marketing, promotional, or advertising emails
- Attempting to use the Email Bridge to relay or forward emails to other addresses
8.3 Attachment Restrictions
Attachments processed through the Email Bridge must:
- Be files you have the right to store and process
- Not contain malware, viruses, or malicious content
- Not contain illegal content or content violating Section 5
- Be related to legitimate task or event management
- Not exceed size limits specified in Section 3.3
-
You should carefully consider whether to forward extremely sensitive attachments (for example, full medical
records, passwords, or highly confidential legal documents), as our email processing service briefly handles
email content in memory and temporarily stores large attachments in infrastructure operated by our service
providers before your device downloads and encrypts them, as described in our Privacy Policy.
9. Enforcement
9.1 Monitoring
We monitor usage patterns, not the content of your tasks, events, or Family Space data. Specifically, we may
analyze:
- Request rates, volumes, and patterns
- Error rates and failure patterns
- Connection behavior and timing
- Resource consumption metrics
- Metadata necessary for service operation
In normal operation, our servers do not see your Family Space content or local data in plaintext form. Family
Space updates are encrypted on your device before being sent to our relay infrastructure, which forwards
encrypted
blobs plus routing metadata and does not inspect or store your Family Space content in plaintext. We have not
built
administrative tools that allow our staff to view decrypted Family Space content.
For the Email-to-Task feature, our Cloudflare-based email bridge briefly processes incoming emails in plaintext
in memory in order to parse them, apply your rules, and handle attachments, then encrypts the resulting email
message with your device’s public key before storage or forwarding through the relay. After this encryption
step,
only your device (which holds the corresponding private key) can decrypt the stored email content. Large
attachments may be temporarily stored by our infrastructure providers to allow your device to download them, as
described in our Privacy Policy.
Logs and telemetry from our Services record technical metadata such as anonymous identifiers, timestamps,
message
counts, attachment counts, and HTTP status codes. We do not log the content of your Family Space sync messages,
tasks, events, or email subjects and bodies. We may access and disclose limited metadata, logs, and other
non-content information we hold in readable form (for example, IP addresses, usage counts, or error messages)
when
required by law, with your consent, or to investigate credible reports of AUP violations, in line with our
Privacy
Policy.
9.2 Automated Enforcement
Our systems automatically enforce certain limits:
- Rate limiting on API requests
- Connection limits on the Relay
- Email volume limits on the Email Bridge
- Storage quotas on attachments
Hitting these limits results in temporary denial of the specific action, not account penalties.
9.3 Manual Enforcement
If we determine you have violated this AUP, we may take the following actions:
| Action |
Description |
| Warning |
Notification of the violation with guidance on compliance |
| Feature Restriction |
Temporary or permanent restriction of specific features |
| Rate Limit Reduction |
Reduced quotas or stricter rate limits |
| Temporary Suspension |
Account suspended for a specified period |
| Permanent Termination |
Account permanently terminated |
| Legal Action |
Referral to law enforcement or civil action |
9.4 Severity Guidelines
| Severity |
Examples |
Typical Response |
| Minor |
Slightly exceeding soft limits, accidental rule violations |
Warning |
| Moderate |
Repeated minor violations, account sharing, quota manipulation |
Feature restriction or temporary suspension |
| Severe |
Harassment, infringing content, fraud, systematic abuse |
Account termination |
| Critical |
Illegal content (especially CSAM), malware distribution, attacks on infrastructure |
Immediate termination + law enforcement referral |
9.5 Appeals
If you believe enforcement action was taken in error:
- Email appeals@lifeload.app within 30 days of the action
- Include your account information and detailed circumstances
- Provide any evidence supporting your appeal
- We will review and respond within 14 days
- You may escalate to legal@lifeload.app if unsatisfied
- Our final decision on appeal is binding
10. Reporting Violations
10.1 How to Report
Security Issues: security@lifeload.app (see Section
4.3)
AUP Violations: abuse@lifeload.app
Legal/DMCA: legal@lifeload.app
Include in your report:
- Description of the violation
- Relevant evidence (screenshots, logs, timestamps)
- Your contact information (optional for anonymous reports)
- Any affected account information you're aware of
10.2 Response Timeline
- Security reports: Acknowledged within 48 hours
- Abuse reports: Reviewed within 72 hours
- Legal/DMCA: Responded to per statutory requirements
10.3 Good Faith Reporting
Reports made in good faith are protected. We will not retaliate against users who report violations in good
faith.
However, false, malicious, or bad-faith reports may result in action against the reporter.
11. Fair Use Guidelines
11.1 Location Services
Do:
- Use location search for legitimate task/event creation
- Allow cached results to be used
- Search for specific, relevant locations
Don't:
- Search for random or nonsensical locations
- Use location search for purposes unrelated to tasks/events
- Attempt to build location databases from search results
- Automate or script location searches
11.2 Relay Sync Services
Do:
- Use sync for sharing with legitimate family members/caregivers
- Allow reasonable time between sync operations
- Let the app manage connection lifecycle
Don't:
- Create excessive sync traffic
- Use sync for real-time data streaming beyond its design
- Keep connections open artificially
- Connect unauthorized clients to the Relay
11.3 Email Processing
Do:
- Forward emails relevant to your tasks and family management
- Configure rules that match your actual email flow
- Review and manage processed emails regularly
Don't:
- Use the Email Bridge as a general email service
- Forward bulk, spam, or marketing emails
- Set up rules that process unrelated emails
- Ignore attachment cleanup notifications
12. Quota Exceeded Behavior
12.1 Soft Limits
When approaching a soft limit:
- You receive an in-app notification
- Features continue to work normally
- Consider reducing usage or upgrading
12.2 Hard Limits
When reaching a hard limit:
- The specific feature is temporarily unavailable
- Other features continue working
- Limits reset at the specified interval
- Upgrading may increase limits
12.3 Abuse Detection
If automated systems detect abuse patterns:
- Your account may be flagged for review
- Limits may be temporarily reduced
- You may receive a request for clarification
- Repeated abuse may result in enforcement action
13. Data Retention After Violations
13.1 Account Termination
Upon account termination for AUP violations:
- Your access is immediately revoked
- Your data may be retained as required by law or for legal defense
- Encrypted data may be retained but remains inaccessible to us as plaintext
- Backups are purged according to our standard retention schedule
13.2 Evidence Preservation
For serious violations, we may:
- Preserve logs, metadata, and relevant data for legal proceedings
- Provide data to law enforcement pursuant to valid legal process
- Retain data necessary to enforce our rights or defend claims
14. Changes to This Policy
We may update this AUP from time to time. When we make changes:
- We will update the "Last Updated" date
- For material changes, we will notify you in the App
- For changes that expand your obligations or restrict your rights, we will provide at least 30 days' notice
- Continued use after changes constitutes acceptance
15. Contact Information
16. Summary: Quick Reference
✅ Do
- Use the Services for personal and family task management
- Respect usage limits and fair use guidelines
- Report security issues and policy violations responsibly
- Keep your account credentials secure
- Comply with all applicable laws
- Use features for their intended purposes
- Leave Family Spaces when you're no longer part of the family
❌ Don't
- Attack, probe, or attempt to compromise our infrastructure
- Reverse engineer the App, Relay, or Email Bridge
- Create bots, scripts, or automated tools
- Share pirated, infringing, or illegal content
- Harass, bully, stalk, or threaten others
- Circumvent limits, quotas, or security measures
- Create multiple accounts or share accounts
- Use the Services for commercial purposes
- Forward spam or bulk email
- Share your email alias publicly
- Exploit vulnerabilities or bugs
- Intercept or modify other users' data
This Acceptable Use Policy is effective as of December 5, 2025.