Last revised: April 17, 2025
Please read this Acceptable Use Policy (“
AUP”) carefully. The AUP is part of our
Terms that you agree to when you sign up for Bubble.
When you use the Platform to build your app, there are certain things you can and cannot do. The AUP describes prohibited uses of the services offered by Bubble and its affiliates. The cases described in this AUP are not exhaustive.
Bubble may modify this AUP at any time by posting a revised version on this page. By using Bubble, you agree to the latest version of this AUP. If you violate the AUP or authorize or help others to do so, we may, among other things, suspend or terminate your use of the Platform, suspend or delete your applications, and cancel your account with Bubble.
If you become aware of any violation of this AUP, you will immediately notify us and provide us with assistance to stop the violation. You may fill out
this form to report a violation.
1. Things You Must Do:A. You must comply with our
Terms.
B. You must comply with all applicable laws, including, without limitation, privacy laws, intellectual property laws, anti-spam laws, export control laws, and regulatory requirements.
C. You must provide accurate and updated account information to Bubble.
D. You must use the Platform in a professional manner. This includes your communications with Bubble employees and its support team.
E. If you are collecting data from the Platform, you must comply with the
Bubble Privacy Policy. If you collect any personal data from the Platform, you agree that you will only use that personal data for the purpose for which that user has authorized it. You agree that you will reasonably secure any personal data you have gathered from the Platform, and you will respond promptly to complaints, removal requests, and "do not contact" requests from us or other users.
2. Things You May Not Do:A. You may not make unauthorized copies, modify, adapt, translate, reverse engineer, disassemble, decompile or create any derivative works of the Platform or any content included therein, including any files, documents, postings, or documentation provided by Bubble or any other user of the Platform (or any portion thereof).
B. You may not determine or attempt to determine any source code, algorithms, methods or techniques embodied by the Platform.
C. You may not use, or encourage, promote, facilitate or instruct others to use Bubble for any illegal, harmful, fraudulent, infringing or offensive use. Prohibited activities or content include, but are not limited to:
Illegal, Harmful or Fraudulent Activities. Any activities that are illegal, that violate the rights of others, or that may be harmful to others, our operations or reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming, creating or distributing malware, ransomware, or other harmful code, engaging in deceptive practices, fraud or misrepresentation
Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others;
Harmful or Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable; content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts; content that promotes hate speech, discrimination, or violence against individuals or groups; content that glorifies self-harm or suicide; content or computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data; viruses, Trojan horses, worms, time bombs, or cancelbots; malicious scripts designed to compromise security or privacy
D. You may not copy, use, disclose or distribute any information obtained from the Platform, whether directly or through third parties, without the consent of Bubble.
E. You may not develop, support or use software, devices, scripts, robots or any other means or processes (including crawlers, browser plugins and add-ons or any other technology) to scrape the Platform or otherwise copy profiles, request for proposal descriptions, and any other data from the Platform.
F. You may not impersonate any person or entity, or falsely state or otherwise misrepresent your affiliation with any person or entity, including without limitation:
By giving the impression that any content of Bubble or any other user of Bubble (such as job postings, request for proposal postings, etc.) emanates from you; or
By using or attempting to use another’s account or email address, or posting content under another’s email address.
G. You may not engage in “framing,” “mirroring,” or otherwise simulating the appearance or function of the Platform.
H. You may not use any private information of any third party, including addresses, phone numbers, and email addresses.
I. You may not disclose information on the Platform that you do not have the consent to disclose (such as confidential information of others (including your employer)).
J. You may not use information from the Platform for spamming purposes, including for the purposes of sending unsolicited emails to users or selling personal information, such as to recruiters, headhunters, and job boards.
K. You may not violate the intellectual property rights of others, including copyrights, patents, trademarks, trade secrets or other proprietary rights. For example, do not copy or distribute the posts or other content of others without their permission.
L. You may not use Bubble to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include, but are not limited to:
Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System;
Interception. Monitoring of data or traffic on a System without permission; and
Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision.
M. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:
Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled.
Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
Operation of Certain Network Services. Operating network services like open proxies, open mail relays, or open recursive domain name servers.
Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.
N. You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not collect replies to messages sent from another internet service provider if those messages violate this AUP or the acceptable use policy of that provider.
O. You may not create multiple accounts or repeatedly create duplicate applications to circumvent subscription requirements, extend free trials, or otherwise access paid features without proper payment. Free trials are limited to a reasonable number per individual or entity, and we reserve the right to determine what constitutes excessive use.P. You must not engage in any abusive, threatening, or harassing communications toward Bubble, including its support team. Repeated disrespectful behavior toward support may result in limited support options, account restrictions, suspension and/or termination.
Q. You are responsible for implementing appropriate security measures for all user data, particularly sensitive information. You are responsible for data security and privacy regardless of how such data entered your application.
3. Monitoring and Enforcement:We reserve the right, but we do not assume the obligation, to investigate any violation of this AUP or misuse of the Platform. We may:
investigate violations of this AUP or misuse of the Platform;
remove, disable access to, or modify any content or resource that violates this AUP or Bubble's Terms.
We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this AUP.
4. Indemnification:You agree to indemnify, defend, and hold harmless Bubble, its affiliates, officers, directors, employees, consultants, agents, and representatives from and against any and all claims, suits, actions, proceedings, liabilities, damages, losses, and/or expenses (including, but not limited to, attorneys' fees) arising from or relating to your violation of this AUP.
5. Reporting of Violations of this Policy:If you become aware of any violation of this Policy, you will immediately notify us and provide us with assistance to stop the violation. To report any violation of this Policy, please fill out
this form.