Skip to main content

Acceptable Use Policy

Last updated: October 2nd, 2020

 

1. INTRODUCTION.

This Acceptable Use Policy (this “Policy”) describes the permissible and prohibited use of the web services (the “Services”) offered by Accelize, including through the Accelize websites and any related mobile websites or mobile application (e.g., accelize.com and portal.accelize.com) (collectively, the "Accelize Sites").

 

2. CHANGES TO THE POLICY.

Accelize reserves the right to make changes to this Policy at any time and for any reason. Accelize will alert users to any changes by updating the "Last Updated" date of this Policy. Any changes or modifications will be effective immediately upon posting the updated Policy on the Accelize Sites, and users waive the right to receive specific notice of each such modification. Users will be deemed to have accepted the changes in any revised Policy by continued use of the Accelize Sites after the date such revised Policy is posted.

 

3. VIOLATIONS.

Accelize reserves the right to suspend or terminate a user's use of Accelize Services and access to Accelize Sites as a result of the user's violation of this Policy. Examples described in this Policy are not exhaustive.

 

4. LIMITATIONS ON CONTENT.

Users may not use, or encourage, promote, facilitate, or instruct others to use, the Services or Accelize Sites for any illegal, harmful, fraudulent, infringing, or offensive use, or to transmit, store, display, distribute, or otherwise make available content that is illegal, harmful, fraudulent, infringing, or offensive. Such determinations shall be at the discretion of Accelize. Prohibited activities and content include, but not be limited to:

4.1 Illegal, Harmful, or Fraudulent Activities. Any activity or content that is illegal, that violates the rights of others, that may be harmful to others (including to Accelize's operations or reputation, at Accelize's discretion), that disseminates, promotes, or facilitates child pornography, that offers or disseminates fraudulent goods, services, schemes, or promotions including make-money-fast schemes, Ponzi, and pyramid schemes, or that facilitates or encourages phishing or pharming.

4.2 Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others.

4.3 Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.

4.4 Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.

 

5. SECURITY VIOLATIONS.

Users may not use the Services to violate the security or integrity of any network, computer, or communications system, software application, or network or computing device (each, a "System"). Prohibited activities include, but are not limited to:

5.1 Unauthorized Access. Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.

5.2 Interception. Monitoring of data or traffic on a System without permission.

5.3 Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. This does not limit the legitimate use of aliases and anonymous remailers.

 

6.  NO NETWORK ABUSE.

Users may not make network connections to any users, hosts, or networks without permission. Prohibited activities include, but are not limited to:

6.1 Monitoring or Crawling. Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled.

6.2 Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.

6.3 Intentional Interference. Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.

6.4 Operation of Certain Network Services. Operating network services such as open proxies, open mail relays, or open recursive domain name servers.

6.5 Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.

 

7. NO E-MAIL OR OTHER MESSAGE ABUSE.

Users may not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (i.e., "spam"), including commercial advertising and informational announcements. Users may not alter or obscure mail headers or assume a sender's identity without the sender's explicit permission. Users may not collect replies to messages sent from another internet service provider if those messages violate this Policy, any other applicable Accelize policy, or the acceptable use policy of that provider.

 

8. MONITORING AND ENFORCEMENT.

Accelize reserves the right, but does not assume the obligation, to investigate any violation of this Policy or misuse of the Services or Accelize Sites. Accelize may, at its discretion:

  • investigate violations of this Policy or misuse of the Services or Accelize Sites; or
  • remove, disable access to, or modify any content or resource that violates this Policy or any other agreement for use of the Services or the Accelize Sites.

Accelize may report any activity suspected to violate any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Accelize's reporting may include disclosing appropriate customer information. Accelize shall cooperate with relevant law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct, including by providing network and systems information related to alleged violations of this Policy.

© 2022 Advanced Micro Devices, Inc
  • Terms and Conditions
  • Privacy
  • Cookie Policy
  • Trademarks
  • Statement on Forced Labor
  • Fair and Open Competition
  • UK Tax Strategy
  • Cookies Settings