OnApp Acceptable Use Policyv2.1 August 2017
The following provisions are the current OnApp Services Acceptable Use Policy (“AUP”) and apply to your use of OnApp Services. OnApp shall be entitled to modify the AUP provisions at any time without prior notice by posting to an OnApp website which you should regularly check for updates. In the event that you do not agree such changes your use of the OnApp Services must stop and continued use thereafter signifies your acceptance of those changes.
1. The OnApp Services may not be used in any way that is not honest, decent, legal and truthful nor for any purpose that would otherwise be objectionable to an ordinary reasonable person. In particular, OnApp Services may not be used (i) for the purposes of deceptive advertising or advertising deceptive products or services; (ii) to publish or distribute obscene, defamatory, threatening or harassing images or words; (iii) to infringe the intellectual property rights of others; (iv) to infringe the privacy or personal data rights of any person; (v) to intentionally, recklessly or negligently store or transmit any malicious code or junk mail/spam; or (vi) in a way that could harm the status or operation of OnApp, its systems, networks, or infrastructure or any OnApp Services.
2. Network and system security violations are prohibited. Examples of such violations include, but are not limited to, the following: (i) Unauthorized access of networks, data, servers, databases, etc. that you do not have permission to access; (ii) Any attempt to test, probe, or scan any OnApp system or network (or use the OnApp network or systems for the purposes of such tests) in order to ascertain vulnerability, or any attempt to breach security or authentication measures without authorization; (iii) Unauthorized monitoring of traffic or data on any network or system without authorization from the owner of such network or system; (iv) Any attempt to interfere or disrupt any service or network (including by use of the following, non-exhaustively listed, methods): flooding, mail-bombing, denial of service attacks, or any other deliberate attempts to overload a system; (v) The forging of any TCP-IP packet headers or any part of the header information in emails; (vi) Any usage or attempted usage of services which you are not authorized to use.
3. You must immediately take action to prevent any known or suspected AUP violations and immediately report the violation to us. Without limiting any of our remedies, should we become aware of any AUP violation by you, (as reasonably determined by us), we reserve the right to take down and/or suspend any affected service or account.