Version July 2017
This acceptable use policy ("AUP") is an integral part of the Contract between Hyperlane and the Customer.
Customer's Legal Compliance
The Customer must comply with applicable laws and regulations. For example, the Customer must have necessary rights to use the content which has been uploaded in the Service by or on behalf of the Customer.
The Customer must comply with separate user instructions concerning the Services. The Customer shall provide reasonable cooperation with regard to investigations on suspected breaches of the Contract.
Illegal or Offensive Use of Services.
Use of the Services in connection with fraudulent activities
Storage or transfer of, or linking to, content that violates trade secrets, copyrights, trademarks, patents, or other intellectual property rights, or contributes to the said violations
Storage or transfer of, or linking to, content that is harassing or excessively violent, inciting to hate or violence, or threatening with violence
Storage or transfer of, or linking to child pornography or content containing non-consensual sexual acts
Promotion of illegal material or products
Unauthorized access to, or attempting to access, systems, networks or data
Use of a user account or computing without the owner's authorization
Collection of user information such as email addresses without the consent of the person identified (phishing)
Monitoring of network traffic or data without authorization
The Customer is not entitled to use the Services for purposes which Hyperlane deems to be illegal or offensive. If the Customer is uncertain whether or not its use of the Services could be deemed illegal or offensive, the Customer should contact Hyperlane in advance and request permission. For example, Hyperlane considers the following actions or content to be illegal or offensive:
If the Customer wishes to use the Services for sending of bulk e-mail or other mass communications, the Customer must first receive Hyperlane’s written consent.
Disruptive Use of Services
The Customer may use, investigate, and modify the operating environment of the Services only within the limits of the user instructions. The Customer may not use the Services in any way that causes security risks to the Service or interferes with the operation of the Services. For example, Hyperlane considers the following actions to be disruptive on the operation of the Services:
Intentional or careless use of the Services in excess of a typically expected server load, such as continuously high CPU or I/O use rate
Intentional or careless configuration of servers that enables unauthorized third party access or otherwise lacks adequate security requirements
Measures which are mainly aimed to circumvent, or interfere with, the monitoring, controlling, or charging of the Services by Hyperlane