Acceptable Use Policy

Last updated on: 01 June 2017

This Acceptable Use Policy (the “Policy”) describes prohibited uses of the maatoo Service (the “Service”), available at http://yourdomain.maatoo.io, operated by 55 weeks (“us,” “we,” or “our”). The examples provided in this Policy are not exhaustive. We may modify this Policy at any time by posting a modified version on the maatoo website. By using the Service, you agree to be bound by the terms of the current version of this Policy. If you violate, authorize or assist others to violate this policy, we may suspend or terminate your use of the Services.

NO UNLAWFUL HARMFUL OR OFFENSIVE USE OR CONTENT

You may not, and shall not encourage, assist, enable or engage any third party to use the Service in an unlawful, harmful or offensive manner or to transmit, store, publish, distribute or otherwise make available any content that is unlawful, harmful or offensive. Prohibited activities and content include:

  • Unlawful activities. Any unlawful activities, including advertising and the transmission or otherwise making available of gambling websites or gambling services or the distribution, promotion or support of child pornography.
  • Harmful and fraudulent activities. Activities that are harmful to others, our operations or our reputation, including offering or distributing counterfeit or fraudulent goods, services, programs or promotions (e.g., make-money-fast programs, ponzi or snowball schemes, phishing or pharming), or participating in other fraudulent practices.
  • Violating contents. Content that infringes or misappropriates the intellectual property rights or proprietary rights of others.
  • Objectionable content. Content that is defamatory, obscene, libelous, invasive of privacy, or otherwise objectionable, including content that depicts child pornography, is related to bestiality, or is non-consensual sexual acts.
  • Harmful content. Content or other computer technology that could damage, interfere with, surreptitiously intercept or expropriate any system, program or data, including viruses, Trojan horses, worms, time bombs or cancelbots.

NO SECURITY BREACHES

You may not use the Service to breach the security or integrity of any network, computer, communication system, software application or computer equipment (each, a “System”). Prohibited activities include:

  • Unauthorized access. Access to or use of any System without authorization, including any attempt to probe, scan or test the vulnerability/violability of a System, or to circumvent security or authentication measures used by a System.
  • Monitoring. The monitoring of data or traffic on a system without permission.
  • Forgery of origin. Falsification of TCP-IP packet headers, email headers, or any other part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.

NO NETWORK ABUSE

You are not authorized to establish network connections to other users, hosts or networkers unless you have the authority to communicate with them. Prohibited activities include:

  • Monitoring or crawling. Monitoring or crawling a system that interferes with or disrupts the system subject to the monitoring or crawling feature.
  • Denial of Service (DoS). Flooding of a target with communication requests so that the target is either unable to respond to legitimate traffic or is so slow to respond that it becomes ineffective.
  • Deliberate interference. Interference with the proper functioning of a system, including any deliberate attempt to overload a system through email bombing, news bombing, broadcast attacks, or flooding techniques.
  • Operation of certain network services. The operation of network services such as open proxies, open mail relays or open recursive domain name servers.
  • Avoiding system restrictions. The use of manual or electronic means to circumvent system usage restrictions, such as access or storage restrictions.

NO E-MAIL ABUSE OR OTHER MISUSE OF MESSAGES

You will not distribute, publish, send or facilitate unsolicited bulk email or other communications, promotions, advertising, or solicitations (such as “spam”), including commercial advertising and informative announcements. You will not alter or obscure mail headers or assume the identity of any sender without their explicit permission. You will not collect responses to messages sent by another Internet service provider if those messages violate this policy or the reasonable terms of use of that provider.

OUR MONITORING AND ENFORCEMENT

We reserve the right, but are not obligated, to prosecute any violation of this policy or abuse of the Service. We have the right:

  • prosecute violations of this Policy or abuse of the Service; or
  • remove, deny access to, or modify any Content or source that violates this Policy or any other agreement we have with you regarding use of the Service.

We may report any activity that we suspect violates any law or regulation to the appropriate law enforcement authorities, regulatory agencies or other appropriate third parties. Our reporting may include disclosure of appropriate customer information. We may also cooperate with appropriate law enforcement authorities, regulators or other third parties to assist in the investigation and prosecution of illegal content by providing network and system information related to the relevant violations of this Policy.

NOTIFICATION OF VIOLATIONS OF THIS DIRECTIVE

If you become aware of any violation of this policy, you will notify us immediately and assist us in stopping or correcting the violation as requested.

CONSEQUENCES OF VIOLATIONS

We reserve the right to check the stored and transmitted contents randomly for correctness. If there is reasonable suspicion of use that violates applicable law or the principles of this policy, we will take appropriate measures to prevent misuse. Such measures may consist, for example, in blocking access to certain services, content, systems or resources or in interrupting connectivity. Prior to taking such measures, we will only issue a warning if we believe that this is appropriate in the circumstances.

If there is a serious breach of the policy, we may terminate your services with immediate effect and without refund of any fees already paid.

In the event of a breach of this guideline, you will be liable for the proven damage, unless you prove that you are not at fault. For damages caused intentionally or by gross negligence you are liable without limitation. In the case of slight negligence, liability for personal injury is unlimited, for property damage and for financial losses is limited in total to a maximum amount of CHF 500,000. In no event shall you be liable for consequential damages, in particular loss of profit, loss of data or damage to reputation.

Please note that in the event of a breach of these guidelines, we may have to disclose your identity to third parties.