Ellipse shape
Grid

LEGAL

Acceptable Use Policy

  1. Restrictions
  2. The Client (and shall ensure that the Authorised Users) shall use the Service in accordance with all applicable local, state and federal laws, and shall not:

    • 1.1 conduct any business or activity or solicit the performance of any activity that is prohibited by law, tortuous, or interferes upon the use of Service by other licensees/ third parties;
    • 1.2 disseminate, display, send, transmit or receive any material that, to a reasonable person may be abusive, obscene, pornographic, defamatory, harassing, grossly offensive, vulgar, threatening, malicious, or violent, regardless of whether the material or its dissemination is unlawful;
    • 1.3 disseminate or transmit unsolicited messages, chain letters or unsolicited commercial email including unintended sending of unsolicited commercial email due to unauthorized access to your use of the Service, whether or not the recipient wishes to receive such mailings;
    • 1.4 access, send, receive, display, disclose, or store any content in violation of any copyright, right of publicity, patent, trademark, service mark, trade name, trade secret or other intellectual property right or in violation of any applicable agreement, or without authorization;
    • 1.5 create a false identity or to otherwise attempt to mislead any person as to the identity, source or origin of any communication;
    • 1.6 export, re-export or permit downloading of any message or content in violation of any export or import law, regulation or restriction of United States, or without all required approvals, licenses and/or exemptions;
    • 1.7 interfere, disrupt or attempt to gain unauthorized access to any computer system, server, network or account for which the Client does not have authorization to access or at a level exceeding its authorization;
    • 1.8 disseminate or transmit any virus, worms, trojan horse or other malicious, harmful or disabling data, work, code or program;
    • 1.9 allow third parties or develop methods for third parties to use the Service;
    • 1.10 sell, rent, lease, use collectively, record, license, sublicense, share, distribute, publicly communicate, transfer or exploit in any other manner the Service;
    • 1.11 make copies, execute, publish, or reproduce Service or its components, unless expressly authorized by the NRM Communications;
    • 1.12 decompile, disassemble, or reverse engineer the Service, in whole or in part, and shall not attempt to obtain in any other manner any source code, and shall not carry out any action to the detriment of NRM Communications’ intellectual property rights or those of its suppliers or licensors;
    • 1.13 develop any derivative works or any type of software program based on the Service, or any other Confidential Information of NRM Communications;
    • 1.14 make available, reveal, disclose, offer, or allow the use of Service by third parties, without our prior written consent;
    • 1.15 alter or modify the Service without our prior written consent;
    • 1.16 reject, avoid, elude, remove, deactivate, or evade, in any way, any protection mechanism of the Service, including without limitation any mechanism used to restrict or control its functions;
    • 1.17 provide or offer access to any third parties to any restricted online access keys or authentication passwords;
    • 1.18 delete, remove, hide, move, or alter any trademark, logo, icon, image, or text that represents the NRM Communications’ name, any derivation thereof, or any icon, image, or text that is likely to be confused with the same;
    • 1.19 engage in any other activity deemed by NRM Communication to be in conflict with the spirit or intent of the Agreement or any related/ referenced policy.
  3. Failure to comply
  4. Failure to comply with this Policy in NRM Communications’ reasonable judgment may result in the immediate termination of Service, responding to law enforcement requests, or any other action deemed necessary by us in order to protect our network, customer relationships, and commitment to the highest possible quality of Service. We will cooperate with law enforcement agencies in cases where the Service is being used by the Client for any suspected illegal activity.

  5. Reporting violations
  6. Violations of this Policy are unethical and may be deemed as an offence. The Client shall report to NRM Communications, any information that it may have concerning instances in which this Policy has been or is being violated including by any of its Authorised Users or other employees. We may at any time initiate an investigation of any use of the Service for compliance with this Policy and the Client agrees to cooperate.

  7. Malicious activity
    • 4.1 Intended: Attempts to exploit other devices or services on and off of NRM Communications’ Service without the permission or implied permission are not permitted. Violations of system or network security may result in criminal and civil liability. We will cooperate with law enforcement if a criminal violation is suspected. We will limit any traffic from the offending device or network immediately.
    • 4.2 Unintended: We will notify you of an exploited software being used for potential malicious activity. If the activity is causing severe damage or strain to other software or networks, we will limit traffic to and from that software immediately. Otherwise, we will notify you and give a reasonable amount of time to secure the software before limiting traffic to and from that software.