Skip to content

Latest commit

 

History

History
58 lines (41 loc) · 4.42 KB

acceptable-use-policy.md

File metadata and controls

58 lines (41 loc) · 4.42 KB

Acceptable Use Policy

Capitalized terms used but not defined in this Acceptable Use Policy have the meanings assigned to them in our Terms of Service and Privacy Policy.

In this Acceptable Use Policy, "you" and "your" refer to you the customer, and "ECAD Labs", "we", "us", and "our" refer to ECAD Labs Inc.

1. Compliance with Laws and Regulations

You are responsible for using the Service in compliance with all applicable laws, regulations, and our Acceptable Use Policy, made up of the policies provided below. These policies may be amended from time to time.

2. Content Restrictions

Under no circumstances will you permit, allow or encourage any users or persons to upload, post, host, execute, or transmit any content to any Services that:

  • is unlawful or promotes unlawful activities;
  • is or contains sexually obscene content;
  • is libelous, defamatory, or fraudulent;
  • is discriminatory or abusive toward any individual or group;
  • gratuitously depicts or glorifies violence, including violent images;
  • contains or installs any active malware or exploits, or uses our platform for exploit delivery (such as part of a command and control system); or
  • infringes any proprietary right of any party, including patent, trademark, trade secret, copyright, right of publicity, or other right.

3. Conduct Restrictions

While using the Service, under no circumstances will you:

  • harass, abuse, threaten, or incite violence towards any individual or group, including our employees, officers, and agents, or other users;
  • use our servers for any form of excessive automated bulk activity (for example, spamming or unauthorized cryptocurrency mining), to place undue burden on our servers through automated means, or to relay any form of unsolicited advertising or solicitation through our servers;
  • use our servers to disrupt or to attempt to disrupt, or to gain or to attempt to gain unauthorized access to, any service, device, data, account or network (unless authorized by us);
  • impersonate any person or entity, including any of our employees or representatives, including through false association with us, or by fraudulently misrepresenting your identity or site's purpose; or
  • violate the privacy of any third party, such as by posting another person's personal information without consent.

4. Services Usage Limits

You will not reproduce, duplicate, copy, sell, resell or exploit any portion of the Service, use of the Service, or access to the Service without our express written permission.

5. Privacy

Misuse of any Personal Information or Personally Identifiable Information is prohibited.

Any person, entity, or service collecting Personal Information or Personally Identifiable Information from the Service must comply with the ECAD Labs Privacy Policy.

You may only collect and process Personal Information and Personally Identifiable Information that you have a lawful basis for collecting and processing.

Personal Information and Personally Identifiable Information may only be collected, processed and disclosed in compliance with all laws and regulations that apply to that information.

6. Excessive Usage

The Service's bandwidth and processing limitations vary based on the Service you use.

If you are using a free Service, we may limit your usage at any time, for any reason, without notice.

If you are using a paid commercial Service and we determine your bandwidth or processing usage is excessive in relation to your agreed service level, or other users of similar Services, we reserve the right to limit your use of the Service or require that you subscribe to a level of Service appropriate for your bandwidth and processing requirements.

7. Spam and Inauthentic Activity

Automated excessive bulk activity and coordinated inauthentic activity, such as spamming, through the Service are prohibited. Such activities include:

  • bulk distribution of unsolicited promotions and advertising
  • inauthentic interactions, such as fake accounts and automated inauthentic activity
  • creation of or participation in secondary markets for the purpose of the proliferation of inauthentic activity
  • using the Service as a platform for propagating abuse on other platforms
  • phishing or attempted phishing

8. Service Provider Protection

You must not engage in activity that significantly harms, or may reasonably be expected to harm, ECAD Labs, its contractors, agents, affiliates, customers or the community at large.