Acceptable Use Policy
Our Acceptable Use Policy applies to all products and services from Cedita, and supplements any additional Acceptable Use Policy from our Customers where they are responsible for providing a product for your usage (through Employment or otherwise). It sets out a list of acceptable and unacceptable conduct for our Services. If we believe there is a violation of the policy that is deliberate, repeated, or presents a credible risk of harm to other users, our Customers, the Services or any third parties, we may suspend your access to the Services.
Please report any violations of this Policy to Cedita Support.
When using Cedita products or services (collectively the "Services"), you must:
- Comply with all applicable Terms of Use or Agreements, including the terms of this Acceptable Use Policy.
- Comply in all respects with all applicable terms of use of third-party applications, including any that the Customer elects to integrate with the Services that you access or subscribe to in connection with the Services.
- Keep passwords and all other security information confidential.
- Monitor and control all activity conducted through your Cedita Account (or another account as part of security controls).
- Use commercially reasonable efforts to prevent unauthorised access to or use of the Services.
- Only upload and disseminate data of which you or our Customer owns all required rights under law and under contract and fiduciary relationships (such as proprietary and confidential information learnt or disclosed as part of employment relationships or under non-disclosure agreements) and only do so in a manner consistent with applicable law.
You must not:
- Use the Services in a way that is against applicable law. This includes:
- Illegal activity such as gambling; piracy; violating copyright, trademark or other intellectual property laws
- Uploading and distributing unlicensed licensed software.
- Accessing or authorising anyone to access the service from an embargoed country.
- Defaming, abusing, harassing, stalking, threatening or otherwise violating the legal rights (such as rights of privacy and publicity) of others for any reason.
- Intentionally distributing viruses, worms, trojan horses, corrupted files, hoaxes, or other items of a destructive or deceptive nature.
- Use the Services in a way that could harm them or impair anyone else's use of them. This includes:
- Attempts to reverse engineer, decompile, hack, disable, interfere with, disassemble, modify, copy, translate or disrupt the features, functionality, integrity or performance of the Services (including any mechanism used to restrict or control the functionality of the Services), any third-party use of the Services or any third-party data contained therein.
- Attempt to gain unauthorised access to the Services, acting to deny others access to the Services, or authorising any third party to access or use the Services on your behalf (such as anyone without a license or revealing to anyone your username or password).
- Using the Services to try to gain unauthorised access to any other service, data, account, or network by any means.
- Using the Services in any manner that may harm minors or that interacts with or targets people under the age of 13, or for collecting personally identifiable information of any minor.
- Engaging in activity that incites or encourages violence or hatred against individuals or groups.
- Use the service to transmit, distribute, or deliver any unsolicited bulk or unsolicited commercial, promotional, or advertising email (ie. spam).
- Abuse referrals or offers to get more service credit than deserved.
- Sublicense, resell, time-share or similarly exploit the Services.
- Access the Services in order to build a similar or competitive product or service or copy any ideas, features, functions or graphics of the Services.
- Share, transfer, or otherwise provide access to an account designated for you to another person.
- Authorise, permit, enable, induce or encourage any third party to do any of the above.
- Send altered, deceptive, or false source-identifying information, including "spoofing", "phishing" or "smishing".
Additionally:
- Cedita is not responsible for the content of any user-created posting, listing, message or upload. The decision to view content or engage with others is yours. We advise you to use your judgement.