Version 1.1 - Effective from August 2017
This Acceptable Use Policy (the “Policy”) describes prohibited uses and activities in respect of the services (“Services”) provided by Harvest Digital Planning Pty Ltd (12 148 958 927) (“we”, “us” or “our”) for access to and use of our The HiVE Digital Engagement System (including any apps, databases, platforms, networks, websites and APIs) and any other related services. This Policy is incorporated by reference into The HiVE - Terms of Service (“Terms”).
All users of the Services (including Authorised Users and End Users) are required to comply with this Policy at all times.
1. Prohibited uses
In using our Services, you agree not to misuse them and are prohibited from engaging in any of the following activities:
- unlawful activities;
- publishing or sharing any material that:
- breach any applicable law, standard, code or other legislative or regulatory requirement including, without limitation, storing, publishing or sharing any material that is fraudulent, defamatory, or misleading;
- infringes or misappropriates the intellectual property or proprietary rights of any other person;
- is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes pornography or extreme acts of violence;
- advocates bigotry or hatred against any person or group of people based on their race, religion, ethnicity, sex, gender identity, sexual preference, disability or impairment; or
- is intended to be inflammatory;
- uploading or otherwise disseminating viruses, adware, spyware, worms, or other malicious code that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots;
- violating the privacy or infringing the rights of any other person;
- probing, scanning, or testing the vulnerability of any system or network;
- breaching or otherwise circumventing any security or authentication measures;
- accessing, tampering with, or using non-public areas or parts of the Services, or shared areas of the Services you haven't been invited to;
- disabling, interfering with or circumventing any other aspect of the Services;
- monitoring data, traffic or other activities undertaken in connection with the Services without permission;
- making network connections to any users, hosts, or networks unless you have permission to communicate with them;
- operating network services like open proxies, open mail relays, or open recursive domain name servers;
- accessing, searching, or creating accounts for the Service by any means other than our publicly supported interfaces (for example, "scraping" or creating accounts in bulk);
- sending unsolicited communications, promotions or advertisements, or spam;
- sending altered, deceptive or false source-identifying information, including "spoofing" or "phishing";
- using manual or electronic means to avoid any use limitations placed on the Services, such as access and storage restrictions;
- accessing or using the Services in a way intended to avoid incurring fees or exceeding usage limits or quotas;
- developing or creating a competing service or product;
- copying, modifying, creating a derivative work of, reverse engineering, decompiling, translating, disassembling, or otherwise attempting to extract the source code of the Services or any component of the Services;
- providing access to anyone who is not an authorised user;
- sub-licensing, reselling, or distributing the Services or any component thereof separate from any integrated application;
- going far beyond the use parameters for any given service or feature as described in any corresponding documentation or advice from us;
- using the Services to stalk, harass, or post direct, specific threats of violence against others; or
- engaging in any activity that adversely affects, or may adversely affect, our reputation or goodwill or the reputation or goodwill of any third party.
Please note this list is not exhaustive and is meant to represent the types of activities that are prohibited.
2. Breaches of this Policy
If you breach this Policy or authorise or help others to do so, we may suspend or terminate your use of the Services in accordance with the Terms. If you use the Services under an employer or organization’s account, we reserve the right to notify your employer or organization of any actual or suspected breach of this Policy.
If you become aware of any breach of this Policy, you must immediately notify us and provide us with assistance, as requested, to stop or remedy the breach.
To report any breach of this Policy, please email us at email@example.com.
We reserve full and final discretion as to whether any use of the Services breach this Policy. By using the Service, you agree that our determination as to whether any use of the Services breach this Policy is final.
3. Monitoring and Enforcement
We reserve the right, but do not assume the obligation, to investigate any breach of this Policy (including, without limitation, any misuse of the Services). In doing so, we may:
(i) remove, disable access to, or modify any content or resource that we consider breaches this Policy, the Terms or any other agreement we have with you for use of the Services; and
(ii) report to appropriate law enforcement officials, regulators or other appropriate third parties any activity that we suspect breaches any law, standard, code or other legislative or regulatory requirement.
4. Changes to this Policy
We reserve the right to modify this Policy from time to time, in our sole discretion, and the modified Policy shall be effective thirty (30) days after you have been notified that it has been posted on our website at www.the-hive.com. You acknowledge and agree that you are responsible for reviewing the most recent version of this Policy which has been posted on our website.