|

Acceptable Use Policy

This Acceptable Use Policy (“AUP”) is legally binding and the terms of the AUP are included to be a part of the Service Agreement (“SA”) with Penta Security Inc. (“Company”), setting forth the terms and conditions for the use of the Services. By accessing or using the Services, the Customer agrees to comply with this AUP. Any violation of this AUP or any unauthorized use or assistance of such by the Customer or its agents shall warrant the Company’s right to suspend or terminate the Services under the SA.

PROHIBITION

The Customer must not use the Services in a manner that the Company believes to be:

a) Primarily intended for online storage or caching, particularly in relation to non-HTML content, such as images, videos, or audio files.

b) In violation of any local, national, foreign, or international law, including but not limited to those relating to child pornography and illegal gambling.

c) In violation of any applicable ICANN (Internet Corporation for Assigned Names and Numbers) regulation or policy.

d) Abusive, deceptive, pornographic, obscene, defamatory, slanderous, offensive, or inappropriate.

e) Infringing or misappropriating any intellectual property or proprietary right of another, including the rights of the Company and its users.

f) Advocating or inducing illegal activities.

g) Used for stalking, harassing, or harming anyone, including minors.

h) Impersonating any person or entity or misrepresenting Customer’s affiliation with any person or entity.

i) Arbitrarily modifying, manipulating, or creating similar derivative software from the software within the service (excluding software provided to the Customer with a separate license that permits public authorization of derivative software).

j) Reverse engineering, disassembling, or decompiling the Services or any software included in the Services, except as permitted by law.

k) Accessing or using the Services in a way intended to avoid incurring fees or exceeding usage limits or quotas.

l) Interfering with or disrupting the Services or any servers, networks, or systems connected to the Services.

m) Using any high-volume automated means, including robots, spiders, scripts, or similar data gathering or extraction methods to access the Services or any other accounts, computer systems, or networks connected to the Cloudbric Website and/or the Services (each a “System”).

n) Violating the security or integrity of a System, including but not limited to:

i) Accessing or using any System without permission, including attempts to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.

ii) Monitoring data or traffic on a System without permission.

iii) Forging packet or email headers, or any part of a message describing its origin or route.

iv) Uploading content that contains viruses, worms, corrupt files, Trojan horses, or other forms of corruptive code, or any other content that may compromise the Services; or

v) Hacking, destabilizing, or adapting the Services, or altering another website to falsely imply it is affiliated with the Services.

o) Connecting to a network, host, or user that is not authorized to communicate, including but not limited to: 

i) Monitoring or crawling the system to interfere with or damage the system. 

ii) Attempting denial of service attacks.

iii) Intentionally obstructing the function of the system, including but not limited to attempting to overload the system.

iv) Operating network services, including but not limited to “open proxy,” open mail relay, and/or open recursive DNS programs. or

v) Using arbitrary methods to avoid constraints in the use of services, such as access/storage restrictions.

p) Attempting to gain unauthorized access to any portion of the Services, web servers of users for a System or any System, whether through hacking, password mining, or any other means.

q) Distributing massive emails, promotions, and advertisements, including for commercial purposes.

r) Forgery of mail headers, using identity without permission from the mail sender, and/or modifying or obscuring services.

 

The Company retains the sole discretion to determine whether the Customer’s use of the Services is prohibited. All Customer Content provided to the Company or actions performed via the Cloudbric Website, whether by Customer’s employees, contractors, or customers and end users, are solely the responsibility of the Customer.

MONITORING AND ENFORCEMENT

While not obligated to perform investigations, in accordance with the terms and conditions of the SA, the Company reserves the right to:

a) Investigate violations of this AUP or misuse of the Services.

b) Investigate and help prevent security threats, fraud, or other illegal, malicious, or inappropriate activity.

c) Remove, disable access to, or modify any content or resource that the Company believes violates this AUP or any other agreement the Company has with Customer for use of the Services; or

d) Suspend or terminate the provision of the Services to the Customer for uses that violate this AUP or any other agreement the Company has with the Customer for use of the Services.

The Company may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. The Company’s reporting may include disclosing appropriate Account Information. The Company may also cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this AUP.

REPORT VIOLATIONS

The Customer may report to the Company any abuse and/or violation of this AUP to [mkt@pentasecurity.com].

MODIFICATIONS TO THE AUP

The Company may, at its sole and absolute discretion, modify this AUP as the case may be. The Company will post notice of such changes on the [Cloudbric Website] or any other location as provided in the MSA. If the Customer objects to any such changes, the Customer’s sole recourse shall be to cease using the Services. Continued use of the Services following notice of any such changes shall indicate the Customer’s acknowledgment of such changes and agreement to be bound by the terms and conditions of such changes.

CONTACT THE COMPANY

If the Customer has any questions, comments, or suggestions regarding this AUP, the Customer may contact the Company at [mkt@pentasecurity.com].

Shopping Basket