This Acceptable Use Policy (“Acceptable Use Policy”) describes rules that apply to any party using the Services and accompanies the FlatPeak Terms of Service (the “Agreement”) entered into between you, the Customer and FlatPeak. Capitalized terms used in this Acceptable Use Policy that are not defined herein have the meanings given to them in the Agreement.

Prohibited conduct

Customer is responsible for their End-Users’ compliance with this Acceptable Use Policy. If FlatPeak deems that the Customer or any of their End-Users violated this Acceptable Use Policy, FlatPeak may suspend, and, ultimately, terminate Customer’s use of the Services. The prohibited conduct in this Acceptable Use Policy is not exhaustive.

No Inappropriate Content or Users

Do not use the Services to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, or objectionable, including, but not limited to, content or communications that FlatPeak determines (a) is false or inaccurate; (b) is hateful or encourages hatred or violence against individuals or groups; or (c) could endanger public safety. This prohibition includes the use of the Services by a hate group. Customer and its End Users are also prohibited from using the Services to promote, or enable the transmission of or access to, any prohibited content or communications described in this paragraph.

Prohibited Activities

Do not use the Services to engage in or encourage any activity that is illegal, deceptive, harmful, a violation of others’ rights, or harmful to FlatPeak’s business operations or reputation, including:

  • Violations of Laws or Standards. Violating laws, regulations, governmental orders, industry standards, or telecommunications providers’ requirements or guidance in any applicable jurisdiction, including any of the foregoing that require (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications.

  • Interference with the Services. Interfering with or otherwise negatively impacting any aspect of the Services or any third-party networks that are linked to the Services.

  • Reverse Engineering. Reverse engineering, copying, disassembling, or decompiling the Services.

  • Falsification of identity or origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.

No Service Integrity Violations.

Do not violate the integrity of the Services, including:

  • Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Services.

  • Security Vulnerabilities. Finding security vulnerabilities to exploit the Services or attempting to bypass any security mechanism or filtering capabilities.

  • Disabling the Services. Any denial of service (DoS) attack on the Services or any other conduct that attempts to disrupt, disable, or overload the Services.

  • Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Services.

  • Unauthorized Access. Attempting to gain unauthorized access to the Services.

Data Safeguards

Customer is responsible for determining whether the Services offer appropriate safeguards for Customer’s use of the Services, including, but not limited to, any safeguards required by applicable law or regulation, prior to transmitting or processing, or prior to permitting End-Users to transmit or process, any data or communications via the Services.