Reliable solutions for online projects

Updated Acceptable Use Policy.

ACCEPTABLE USE POLICY

Effective: March 21, 2024

(revised)

This acceptable use policy (hereinafter “AUP”) is entered by and between

COMPANY (or “We”), which means and includes Our successors, assigns and affiliates), and YOU, personally or the person on whose behalf You legally act (hereinafter referred to as “You”),

defines acceptable practices relating to the use of the Company’s Services, web-platforms, applications, online complex tech-for-tech products (including WEBSA) by You and Your users, partners, contractors, users that have gained access to Service through Your accounts or within cooperation with You of any kind.

General provisions. By using the Service, You acknowledge that You and Your Users are responsible for compliance with AUP. You are responsible for violations of AUP by any User that accesses Services through Your Account.

The Company reserves the right to modify AUP at any time without notice. We may attempt to notify You of any such modifications via e-mail or other type of notification.

Investigations. In most cases, We shall notify You of complaints received regarding violations. You agree to promptly investigate all such complaints and take all necessary actions to remedy any violations. We may inform the complainant that You are investigating the complaint.

You shall make the most in order for all the complaint reports of third parties to be considered and resolved promptly. If the Company shall become aware of the AUP violation, the Company may initiate an investigation that may include collecting information from You within the terms specified by the Company. You shall comply with all reasonable requests pursuant to investigations. You shall cooperate with the Company in good faith. If You shall not provide assurances that You shall not violate the AUP, or shall not get in communication with the Company (including ignorance of notifications within the period specified by the Company), the Company may suspend Services or terminate the Service Agreement.

The Company shall fully cooperate with law enforcement authorities in investigating suspected lawbreakers and reserves the right to report to law enforcement authorities any suspected illegal activities that the Company may become aware of. The Company reserves the right to disclose Your or Users’ information to the extent authorized by law. Company reserves the right to access, read, preserve, and disclose any information as the Company reasonably believes is necessary to

(i) respond to any applicable law, regulation, legal process or governmental request; or

(ii) enforce AUP, including investigation of potential violations hereof; or

(iii) detect, prevent, or otherwise address fraud, security or technical issues; or

(iv) respond to all the requests; or

(v) protect the rights, property or safety of the Company, Our partners and the public.

Prohibited Uses. It is prohibited to use Services, Our Website, web-platforms, applications, online complex tech-for-tech products (including WEBSA) for or in connection with:

1. Dissemination of any information, photo, or video materials that encourage, propagandize, directly or indirectly

(i) military actions, justify war and/or military actions or any encroachment on states’ territorial integrity and sovereignty; or

(ii) national, ethnic, racial, religious controversy, all types of chauvinism, information that constitutes incitement, appeal, justification, or encouragement of any discrimination, hostility, violence, cruelty to animals, destruction, property damage; or

(iii) terrorism.

2. Distribution of sexual or erotic materials that depict people under the age of eighteen (18) or in such a way as to suggest that they are under the age of eighteen (18), as well as other forms of sexual or erotic materials that are prohibited by applicable law (by the law of every and all states in whose territory the said materials are available).

3. Posting materials that contain information that depicts incest, snuff, excrement, or excretion of human body waste on another person, depicts or is associated with mutilation, rape, or zoophilia.

4. Distribution or provision of access to materials (content, software, torrent trackers, online cinemas, etc.) in violation of the intellectual property rights of any person, including, but not limited to, violation of copyright, related rights.

5. Distribution or promotion of information, materials, goods, or services violating a third party’s trademark (logo, name, title) rights, patent rights, and trade secrets.

6. Sending messages to unsolicited mail, including sending “spam” or other promotional materials to persons who do not directly request such materials, or with whom You have no business relationship; or distributing, advertising or promoting software or services whose primary purpose is to encourage or facilitate the operation of unsolicited commercial email or spam, as well as mailing or advertising with elements that may be considered obscene, offensive, harassing, threatening.

7. Distribution of malware, codecs, and other similar software.

8. Implementation of actions aimed at seizing control (escalation of rights) over a remote/local computer system, or destabilizing it, or denial of service, or for similar purposes.

9. Collection, processing, publication, or dissemination of information, violation of privacy rights and obligations to maintain confidentiality or protect personal data.

10. Hacking attempts (phishing, fraud, etc.).

11. Causing damage to other people or entities.

12. Fraud and activities that require obtaining prior permits or licenses without such permits or licenses.

13. Creation and distribution of scripts and/or software for automatic account creation and automated reporting.

14. Dissemination of false or distorted information, including disinformation campaigns, as well as offensive and similar information.

15. Distribution of information about suicide and self-harm intended to shock or engage in such activities, as well as dissemination of materials that encourage dangerous or illegal activities.

16. Human trafficking, illicit sex work and pimping, sexual exploitation, trade in organs or human biological materials for donation.

17. Threats of bodily harm or other types of threats.

18. Promotion and distribution of prohibited or restricted services or goods, including, but not limited to, illegally obtained financial information, explosives/weapons, endangered species, prescription pharmaceuticals, drugs, counterfeit documents or money, etc., including publishing or distributing instructions for its manufacture.

19. Forgery of signatures or other identifiers of any person, as well as participation in activities aimed at deceiving others about the user’s identity.

20. Implementation of deceptive marketing techniques and activities that require obtaining prior authorizations or licenses without such authorizations or licenses.

21. Actions intended to abuse, restrict or interfere with the actions of another person using the Services, including by generating excessive network traffic through the use of automated or manual functions that are not related to the usual, personal or business use of Services.

22. Causing or attempting to cause security breaches or interruptions in Internet communications.

23. Performing any form of network monitoring that shall intercept data not intended for You.

24. Bypassing user authentication or security of any host, network, or account.

25. Interfering with or denial of service to your own websites (for example, a denial-of-service attack).

26. Using any program/script/command or sending messages designed to interfere with or disable another person’s dialog session.

27. Providing false or incorrect data, including fraudulent use of credit card numbers, or attempting to circumvent or alter the processes or procedures for measuring time, bandwidth, traffic, storage, or any other resource usage.

28. Causing concerns through the use of a particular language, sending frequency or message size.

29. Unauthorized use or forgery of message header information.

30. Soliciting a mailing address or any other email address other than an advertising account or services for the purpose of stalking or collecting responses.

31. Creating or forwarding “chain letters” and any other type of “pyramid schemes”.

32. Use of unsolicited email generated as part of the use of the Services or networks of other Internet service providers on our behalf or for advertising any Services or enabled through the Services.

33. Exporting, re-exporting, or allowing the download of any content in violation of applicable export-import laws or without all necessary approvals or licenses.

34. Selling, exporting or re-exporting of the Services, directly or indirectly, in violation of any U.S. or EU sanctions, export or import laws, any executive orders, or any rules, regulations or orders issued by the U.S., European Union authorities. In particular, selling, exporting, re-exporting of the Services, directly or indirectly, to the Russian Federation and/or for use in the Russian Federation, as well as granting permission, authorization or assistance to any third party to perform the specified actions.

You shall undertake Your best efforts to ensure that the purpose of this clause is not frustrated by any third parties further down the commercial chain, including by possible resellers. You shall set up and maintain an adequate monitoring mechanism to detect conduct by any third parties further down the commercial chain, including by possible resellers, that would frustrate the purpose of this clause.

35. Any intrusive or harmful actions within any directly or indirectly connected network, utilizing or not any code (scripts, utilities, bots, etc.) or methods, including but not limited to: server alert messages or any messages sent on an injection basis; bypass or attempt to bypass any user authentication or host, network or account security system; access, attempt to access, including allowing third-party access to data or content not intended for a particular user; probing or in any way examining network security level in general or of any part of the network; creation of multiple processes or any similar actions causing network overload; port scanning, query flooding, packet forgery, routing information spoofing; denial-of-service attacks, traffic sniffers, flooding, spoofing, ping attacks, smurf attacks, WinNuke attacks, land and teardrop attacks, malware propagation, as well as IRC bots utilization such as Eggdrop or BitchX, etc., regardless of whether the actual intrusion leads to damage or loss of data.

36. Carrying out any other illegal activity or violating any applicable law, the rights of third parties in the territory of any country where you operate, or Your Content is available.

You may not disable, circumvent, or otherwise interfere with the security of Services or features that prevent or restrict the use or copying of any content or impose restrictions on the use of Services. It is prohibited to use or distribute tools designed to violate the level of security, as well as tools containing viruses or trojans.

If You are involved in a security breach, the Company reserves the right to share any relevant information involved in such breach with system administrators at other sites in order to assist them in resolving incidents.

This policy applies to messages sent through Services, messages sent over any network by You or any person on Your behalf that directly or indirectly relate to a recipient on a website or an email address hosted through the Services.