Terms of Service

FlowOps

67 Franklin Roosevelt Avenue, 3011 Limassol, Cyprus

Email: info@domain.com

Effective date: September 15, 2025

Service Agreement Overview

These Terms of Service govern your use of FlowOps' DevOps engineering services, website, and related offerings. By accessing our website or engaging our services, you agree to be bound by these terms.

Our services include CI/CD pipeline implementation, infrastructure as code development, container orchestration, and related DevOps consulting. These terms outline the scope, limitations, and expectations for both parties.

Please read these terms carefully. If you do not agree with any part of these terms, you should not use our services or website. We may update these terms periodically, and continued use constitutes acceptance of any changes.

Service Usage Guidelines

1. Acceptable Use Policy

Our services are designed for legitimate business purposes related to DevOps implementation and infrastructure management.

Permitted Uses:

  • • Implementing CI/CD pipelines for software development
  • • Automating infrastructure deployment and management
  • • Setting up container orchestration platforms
  • • DevOps consulting and technical guidance
  • • Performance optimization and monitoring implementation

2. Prohibited Activities

The following activities are strictly prohibited when using our services:

  • • Using services for illegal activities or malicious purposes
  • • Attempting to breach security measures or access unauthorized systems
  • • Deploying applications that violate intellectual property rights
  • • Using services to distribute malware, viruses, or harmful content
  • • Overloading systems or attempting denial of service attacks
  • • Reverse engineering proprietary methodologies or tools

3. Service Access Requirements

To access our services effectively, clients must meet certain technical and procedural requirements:

  • Provide necessary access credentials and permissions for target systems
  • Maintain appropriate development and testing environments
  • Ensure compliance with relevant security and regulatory standards
  • Designate technical contacts for project coordination
  • Follow agreed-upon change management procedures

4. Fair Usage Guidelines

Our services are subject to fair usage policies to ensure quality delivery for all clients:

Support Services:

  • • Reasonable response times based on urgency
  • • Limited to agreed scope and hours
  • • Documentation and training as specified

Resource Usage:

  • • Appropriate use of computing resources
  • • Reasonable storage and bandwidth consumption
  • • Compliance with platform limitations

Account Management and Access

5. Service Engagement Process

Professional DevOps services require formal engagement procedures to ensure successful project delivery:

Initial Consultation:

  • • Technical requirements assessment
  • • Infrastructure analysis and recommendations
  • • Project scope definition and timeline
  • • Service agreement and contract execution

No formal account creation is required for basic inquiries, but service delivery requires signed agreements and defined project parameters.

6. Access Security and Responsibilities

Clients are responsible for maintaining secure access to their systems and following security best practices:

Client Responsibilities:

  • • Secure credential management
  • • Regular access review and updates
  • • Prompt notification of security incidents
  • • Compliance with internal security policies

FlowOps Commitments:

  • • Secure handling of access credentials
  • • Least privilege access principles
  • • Regular security training for staff
  • • Confidentiality of client systems

7. Service Suspension and Termination

We reserve the right to suspend or terminate services under specific circumstances:

Immediate Suspension:

Services may be immediately suspended for security breaches, prohibited activities, or violations of these terms that pose immediate risk.

Termination with Notice:

Either party may terminate services with 30 days written notice. Outstanding obligations and deliverables will be completed within the notice period.

Service Availability and Limitations

8. Service Availability and Maintenance

We strive to provide reliable services but cannot guarantee 100% uptime due to various factors beyond our control:

Planned Maintenance

Scheduled maintenance windows with advance notice for system updates and improvements.

Emergency Maintenance

Unscheduled maintenance for critical security updates or system failures.

Third-Party Dependencies

Availability subject to cloud providers, internet connectivity, and external services.

9. Geographic and Technical Restrictions

Our services may be subject to certain limitations based on geographic and technical factors:

  • Services primarily designed for Cyprus and European Union markets
  • Compliance requirements may vary by jurisdiction
  • Certain cloud services may have regional availability restrictions
  • Language support primarily in English with basic Greek assistance
  • Time zone considerations for support and consultation services

10. Service Modifications and Updates

We continuously improve our services and may implement changes to enhance functionality, security, or compliance:

Types of Modifications:

  • • Feature enhancements and new service offerings
  • • Security updates and vulnerability patches
  • • Performance optimizations and efficiency improvements
  • • Compliance updates for regulatory requirements
  • • Tool and technology stack updates

Major changes affecting service delivery will be communicated with reasonable advance notice. Clients will be notified of significant modifications that may impact their existing implementations.

Intellectual Property and Content Rights

11. Service Methodologies and Tools

FlowOps retains ownership of proprietary methodologies, frameworks, and tools developed for service delivery:

  • • Custom automation scripts and deployment templates
  • • Proprietary monitoring and alerting configurations
  • • DevOps best practice frameworks and documentation
  • • Training materials and technical guides

12. Client-Generated Content and Data

Clients retain ownership of their data, applications, and business-specific configurations:

Client Ownership:

  • • Application source code and data
  • • Business logic and configurations
  • • Infrastructure specifications
  • • Custom business requirements

Shared Resources:

  • • Implementation documentation
  • • System architecture diagrams
  • • Configuration management scripts
  • • Operational procedures

13. License Grants and Usage Rights

Upon service completion and full payment, clients receive appropriate usage rights for delivered solutions:

Client Rights: Non-exclusive, perpetual license to use, modify, and maintain delivered configurations and documentation for their internal business operations.

Restrictions: Clients may not redistribute, resell, or use proprietary methodologies for competing service offerings without explicit written permission.