Acceptable Use Policy
This Acceptable Use Policy sets forth certain restrictions on the use of Redzone’s Software Services. Redzone may update this Acceptable Use Policy upon written notice to Customer as provided for by the Agreement, with updates being effective as of the date of the notice.
Customers and Users may not, and may not permit any third party, to do or attempt to do any of the following in connection with the use of Redzone’s Software Services:
- engage in or promote any illegal activity;
- use the Software Services in excess of the usage limits permitted by the Agreement or allow any person other than Users to use the Software Services;
- engage in activity that is likely to damage, disable, disrupt, overload, interfere with, or impair the features, functionality, integrity, or performance of Software Services;
- (a) circumvent any security or authentication feature, or access, or storage restriction of the Software Services, (b) scan, monitor, probe, or test the vulnerability of the Software Services, or (c) take any action that is reasonably likely to pose a threat to the security or operation of the Software Services or the network, computer systems, communications systems, software applications, or computing devices of Redzone or a third party;
- infringe upon or violate the rights of Redzone or any third parties, including Intellectual Property Rights or rights of privacy or publicity;
- impersonate any person or entity, including an employee of Redzone, an “Administrator”, an “Owner”, or any other User, or falsely state or otherwise misrepresent affiliation with a person, organization, or entity;
- engage activity or post any material that is discriminatory, abusive, harassing, incites or encourages violence or hatred against an individual or group, or that is reasonably likely to be harmful to Redzone or its business reputation, the Services, third parties, or that Redzone deems excessive, abusive, fraudulent, offensive, or objectionable;
- remove or alter any notices, attribution, or labels of Intellectual Property Rights published in connection with the Software Services or Documentation;
- hack, share, distribute, resell, rent, lease, transfer, modify, decompile, compile, disassemble, translate, copy, reverse engineer, or create derivative works of any part of the Software Services;
- store, process, transmit, or disseminate any content that contains or is used to initiate unsolicited messages or communication, false source-identifying information (including “phishing” or “spoofing”), advertisements, or spam;
- upload to, or transmit from, the Software Services a denial-of-service attack, software viruses or other harmful or harmful computer code, files or programs such as Trojan horses, worms, time bombs, cancelbots, malware, or spyware;
- use the Software Services for competitive analysis or the development or provision of a competing service or product; or
- use the Software Services for consumer purposes, as the Software Services are intended for business or organizational use.