Acceptable Use Policy
This Acceptable Use Policy (AUP) outlines the rules governing the use of our website, products, and services. It is designed to protect our customers and the Internet community from irresponsible, abusive, or illegal activities.
General Violations
This policy defines actions considered prohibited, particularly those that may disrupt access to or the performance of our services.
Prohibited Actions - General Terms and Conditions
- Copying or duplicating licensed products, except for personal use.
- Selling, assigning, or distributing licensed products.
- Publishing or sharing licensed products or derivative data for commercial use.
- Charging fees for services using licensed products or derivatives.
- Making licensed data available to others or distributing it in any format.
- Unauthorized sharing of passwords or access credentials.
- Institutional users must follow their specific license agreements.
Prohibited Actions - Impersonation / Forgery
- Modifying identifying network information to mislead others.
- Impersonating any person using false or forged information.
Prohibited Actions - Network Abuse
- Activities that disrupt or degrade service for others, including denial-of-service attacks.
Prohibited Actions - Commercial Email
- Sending unsolicited commercial email using our systems.
- Sending large volumes of unsolicited email ("mail bombing").
Prohibited Actions - Access and Security
- Attempting to bypass authentication or security measures.
- Accessing data, accounts, or systems without authorization.
- Probing or testing system vulnerabilities without permission.
Prohibited Actions - Automated Interference
- Using scripts, bots, or automated tools to interfere with user sessions or system performance.
Enforcement
We reserve the right to monitor usage of our services. If prohibited activity is detected, access may be temporarily suspended. Notification will be provided when possible, and access will be restored once the issue is resolved.