This ACCEPTABLE USE POLICY ("AUP") describes acceptable use of and access to the Cloud Services offered by Easyflow.io Pty. Ltd. ("EASYFLOW.IO") through the Website.
BY ACCESSING OR USING THE SERVICES, YOU AGREE TO THE TERMS OF THIS AUP.
If you violate this AUP or authorize or help others to do so, EASYFLOW.IO may suspend or terminate your use of the Cloud Services in accordance with the terms of the Cloud Services Agreement or Terms of Service. Unless otherwise defined herein, all capitalized terms used within this AUP have the same meaning as ascribed to such terms in the Cloud Services Agreement or Terms of Service.
Customer may not upload Customer Data or use the Services in a manner that EASYFLOW.IO believes:
Violates any local, state, national, foreign, or international statute, regulation, rule, order, treaty, or other law (each a "Law"), including, but not limited to, the Digital Millennium Copyright Act, or those Laws concerning child pornography and illegal gambling;
Is abusive, deceptive, pornographic, obscene, defamatory, slanderous, offensive, or otherwise inappropriate;
Violates or otherwise encroaches on the rights of others, including, but not limited to, infringing or misappropriating any intellectual property or proprietary right of another;
Advocates or induces illegal activity;
Stalks, harasses, or harms anyone, including minors;
Impersonates any person or entity or otherwise misrepresents Customer's affiliation with a person or entity;
Modifies, alters, tampers with, repairs, or otherwise creates derivative works of any software included in the Cloud Services (except to the extent software included in the Cloud Services is provided to Customer under a separate agreement or license that expressly permits the creation of derivative works);
Except as allowed by local law, reverse engineers, disassembles, or decompiles the Cloud Services or software included in the Cloud Services;
Accesses or uses the Cloud Services in a way intended to avoid incurring fees or exceeding usage limits or quotas;
Interferes with or disrupts the Cloud Services or servers or networks connected to the Cloud Services;
Uses any high volume automated means (including robots, spiders, scripts or similar data gathering or extraction methods) to access the Cloud Services or any other accounts, computer systems, or networks connected to the Services (each a "System");
Attempts to gain unauthorized access to any portion of the Services or any System, whether through hacking, password mining, or any other means;
Violates the security or integrity of a System, including, but not limited to:
- Accessing or using any System without permission, including attempts to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System;
- Monitoring data or traffic on a System without permission;
- Forging packet or email headers, or any part of a message describing its origin or route;
- Uploading Customer Data that contains viruses, worms, corrupt files, Trojan horses, or other forms of corruptive code, or any other content that may compromise the Cloud Services; or
- Hacking, destabilizing, or adapting the Cloud Services, or altering another website to falsely imply it is affiliated with the Cloud Services;
Connects to any users, hosts, or networks where Customer does not have permission to communicate with such users, hosts, or networks, including, but not limited to:
- Monitoring or crawling the System so that the System is impaired or disrupted;
- Conducting denial of service attacks;
- Intentionally interfering with the proper functioning of any System, including any deliberate attempt to overload a system by any means;
- Operating network services like open proxies, open mail relays, or open recursive domain name servers; or
- Using means (manual or electronic) to avoid any use limitations placed on the System, such as access and storage restrictions;
Distributes, publishes, sends, or facilitates unsolicited mass e-mailings, promotions, advertising, or solicitations, including commercial advertising and informational announcements;
Alters or obscures mail headers or assume a sender's identity without the sender's explicit permission; or
Collects replies to messages if those messages violate this AUP.
While not obligated to perform investigations, in accordance with the terms of the Cloud Services Agreement or the Terms of Service, EASYFLOW.IO may:
Investigate violations of this AUP or misuse of the Cloud Services;
Investigate and help prevent security threats, fraud, or other illegal, malicious, or inappropriate activity;
Remove, disable access to, or modify any Customer Data or resource that EASYFLOW.IO believes violates this AUP or any other agreement EASYFLOW.IO has with Customer for use of the Cloud Services; or
Suspend or terminate provision of Cloud Services to customer for uses that violate this AUP or any other agreement EASYFLOW.IO has with Customer for use of the Cloud Services.
Customer can report abuse of this AUP to email@example.com.
EASYFLOW.IO may, in its sole and absolute discretion, modify this AUP from time to time. EASYFLOW.IO will post notice of such changes on the Website or as provided in the Cloud Services Agreement or the Terms of Service. If Customer objects to any such changes, Customer's sole recourse shall be to cease using the Cloud Services. Continued use of the Cloud Services following notice of any such changes shall indicate Customer's acknowledgement of such changes and agreement to be bound by the terms and conditions of such changes.