Acceptable Use Policy
Effective Date: December 2, 2022
This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“you”, “your”, “yours”, or “Customer”) using any products and services (“Services”) provided by Twin Harbor Web Solutions, Inc. DBA WaiverFile (collectively, “WaiverFile”, “we”, “us” or “our”) and any user of any software application or service made available by Customer that interfaces with the Services (“End User”). The prohibited conduct in this AUP is not exhaustive. Customer is responsible for its End Users’ compliance with this AUP. If Customer or any End User violates this AUP, WaiverFile may suspend Customer’s use of the Services. This AUP may be updated by WaiverFile from time to time upon reasonable notice, which may be provided via Customer’s account, e-mail, or by posting an updated version of this AUP page.
No Inappropriate Content or Users. Do not use the Services to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, or objectionable, including, but not limited to, content or communications which WaiverFile determines (a) is false or inaccurate; (b) is hateful or encourages hatred or violence against individuals or groups; or (c) could endanger public safety. Customer and its End Users are also prohibited from using the Services to promote, or enable the transmission of or access to, any prohibited content or communications described in this paragraph.
Prohibited Activities. Do not use the Services to engage in or encourage any activity that is illegal, deceptive, harmful, a violation of others’ rights, or harmful to WaiverFile’s business operations or reputation, including:
- Violations of Laws. Violating laws, regulations, governmental orders, or industry standards or guidance in any applicable jurisdiction (collectively, “Applicable Laws”). This includes violating Applicable Laws requiring (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications.
- Interference with the Services. Interfering with or otherwise negatively impacting any aspect of the Services or any third-party networks that are linked to the Services.
- Reverse Engineering. Reverse engineering, copying, disassembling, or decompiling the Services.
- Falsification of Identity or Origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.
No Service Integrity Violations. Do not violate the integrity of the Services, including:
- Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Services.
- Security Vulnerabilities. Finding security vulnerabilities to exploit the Services or attempting to bypass any security mechanism or filtering capabilities.
- Disabling the Services. Any denial of service (DoS) attack on the Services or any other conduct that attempts to disrupt, disable, or overload the Services.
- Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Services.
- Unauthorized Access. Attempting to gain unauthorized access to the Services.
Data Safeguards. Customer is responsible for determining whether the Services offer appropriate safeguards for Customer’s use of the Services, including, but not limited to, any safeguards required by Applicable Laws, prior to transmitting or processing, or prior to permitting End Users to transmit or process, any data or communications via the Services.