- About this Acceptable Use Policy
- This Acceptable Use Policy (AUP) outlines acceptable and appropriate behaviours expected of any person using and/or accessing any of Ocean Informatics Pty Limited (the Company)’s software services (End Users or you).
- End Users must comply with this AUP and must not use, encourage, promote, facilitate, or instruct any person to breach this AUP.
- End Users must act appropriately in all respects and must not display, store, distribute, transmit or otherwise make available communications or content via the Company’s software (the Software) and/or the Company’s services (the Services) that contains abusive, offensive, harmful or objectionable language, that has the quality to defame or libel others, or that infringes on the privacy rights or other rights of others.
- End Users must not view, download, copy, send, post or access information that is illegal, fraudulent or obscene when using or accessing any of the Software and/or Services and must not use such software and services in any way prohibited by this AUP or which would otherwise cause the Company loss and/or damage and/or negatively affect its reputation, associated goodwill or cause it to fall into disrepute or dispute with any third party.
- End User prohibitions
- Without limiting the above provisions of this AUP, in the course of any End User using and/or accessing any Software and/or Service of the Company, the following are strictly prohibited:
- accessing any other person’s account other that End User’s allocated account;
- uploading any content about a person without the person’s consent or using the Software and/or Services to violate all or any legal rights of any person or company or other entity in any jurisdiction;
- using the Software and/or Services (including any intentional access, creation, modification, transmission, distribution or storage of information, data or material) in breach of the Privacy Act 1988 (Cth) or any other applicable data protection laws in any relevant jurisdiction;
- using the Software and/or Services in relation to crimes such as theft and fraud;
- using the Software and/or Services in breach of any laws, including but not limited to, laws relating to the protection of copyright, trade secrets, patents or other intellectual property and laws relating to spam or privacy;
- unauthorised copying of copyrighted material including, but not limited to, the installation of any copyrighted software for which you do not have an active licence;
- using the Software and/or Services in connection with the provision of negligent or unlawful services;
- exporting software, technical information, encryption software or technology, in violation of domestic and international export control laws;
- any form of computer hacking or introduction of malicious programs into the Company’s or any of its service provider’s network, computer or servers (e.g., viruses, worms, Trojan horses, e-mail bombs, broadcast attacks or any other flooding techniques) or otherwise violating the security or integrity of any network computer or communications system, software application of the Company or its service providers;
- revealing your account password to others or allowing use of the Software and/or Services by others who are not authorised to do so including attempting to probe, scan or test the vulnerability of an account or the Software;
- using the Software and/or Services to offer or distribute fraudulent goods or services;
- using the Software and/or Services to upload, store, display, transmit content that is invasive, defamatory and/or obscene;
- using the Software and/or Services to carry out security breaches or disruptions of network communication is strictly prohibited. Security breaches include, but are not limited to, accessing data of which you are not an intended recipient or logging into a server or account that you are not expressly authorized to access or corrupting any data. For the purposes of this paragraph, “security breaches” includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes (except for the legitimate use of aliases and anonymous remailers, which is permitted);
- using the Software and/or Services to execute any form of network monitoring or crawling which will intercept data not intended for you without permission;
- using the Software and/or Services to circumvent user authentication or security of any of the Company’s hosts, networks or accounts or those of its customers or suppliers;
- using the Software and/or Services to interfere with or deny service to anyone;
- using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, any persons’ use of the Software and/or Services;
- sending unsolicited email messages through or to users of the Software and/or Services in breach of the Spam Act 2003 (Cth);
- using the Software and/or Services to send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages;
- using the Software and/or Services to send email to any email address, with the intent to spam or harass;
- operating network services like open proxies, open mail relays, or open recursive domain name servers;
- using the Software and/or Services to create or forward “chain letters”, “Ponzi” or other “pyramid” schemes of any type; and
- use of the Software and/or Services in breach of any person’s privacy (such as by way of identity theft or “phishing”).