Acceptable Use Policy
Last Updated: Sept 21, 2016
Acceptable Use Policy
All capitalized terms not defined in this Acceptable Use Policy (AUP) have the meanings given to them in the main body of the Agreement.
This AUP applies to your use of the Site and Services provided by Unbounce.
The examples described in this AUP are not exhaustive. Unbounce (“we”) may modify this AUP at any time, without prior notice. By using the Site or Services, you agree to the latest version of this AUP. If you violate this AUP or authorize, encourage, or help others to do so, Unbounce may immediately, without notice or liability, suspend or terminate your use of the Services.
Reporting Suspected Violations
Unbounce encourages you to report suspected violations by sending an email with the page(s) in question, and the details of the alleged infraction, to firstname.lastname@example.org. We will investigate any reported violations of this AUP and will respond where appropriate or necessary, at our sole discretion. You agree to accept, in full, any conclusions related to an investigation into your complaint, without limitation.
No Illegal, Harmful, or Offensive Use or Content
You may not use, or encourage, promote, facilitate or instruct others to use, the Site or Services for any illegal, harmful or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive. Prohibited activities or content include, but are not limited to:
Illegal Activities. Any illegal activities, including advertising, transmitting, or otherwise making available gambling sites or services or disseminating, promoting or facilitating child pornography.
Harmful or Fraudulent Activities. Activities that may be harmful to others, our operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming), or engaging in other deceptive practices.
Infringing Content. Content that infringes or misappropriates the intellectual property or proprietary rights of others.
Offensive Content. Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.
Harmful Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.
No Security Violations
You may not use the Site or Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device. Prohibited activities include, but are not limited to:
Unauthorized Access. Accessing or using any system without permission, including attempting to probe, scan, or test the vulnerability of a system or to breach any security or authentication measures used by a system.
Interception. Monitoring of data or traffic on a system without permission.
Falsification of Origin. Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route, or otherwise falsifying or masking your identity or source. This prohibition does not include the use of aliases or anonymous remailers.
No Network Abuse
You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include, but are not limited to:
Monitoring or Crawling. Monitoring or crawling of a system that impairs or disrupts the system being monitored or crawled.
Denial of Service (DoS). Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
Intentional Interference. Interfering with the proper functioning of any system, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
Operation of Certain Network Services. Operating network services like open proxies, open mail relays, or open recursive domain name servers.
Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on a system, such as access and storage restrictions.
No E-Mail or Other Message Abuse
You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this AUP or the AUP of that provider.
Further Prohibited Conduct
You further agree that you will not:
(a) facilitate the unlawful distribution of copyrighted or trademarked content;
(b) except as expressly permitted by Unbounce, license, sublicense, rent, or lease the Services to any Third Party;
(c) advertise to or solicit users who have requested not to be contacted about other services, products, or commercial interests, or who have unsubscribed from your marketing materials;
(d) use the Site or Services, or information obtained therein to stalk, threaten, or in any way harass another person or persons;
(e) collect, use, disclose, or disseminate data, including Personal Information, without informed consent, for unlawful purposes, or in violation of applicable law or regulations;
(f) request, solicit or in any way obtain access to usernames, passwords, or other authentication credentials for the purpose of automating logins to the Site or Services;
(g) attempt to gain unauthorized access to Unbounce’s computer systems;
(h) engage in any activity that disrupts, diminishes the quality, interferes with the performance, or impairs the functionality of the Site or Services;
(i) decompile, reverse engineer, or attempt to access any source code underlying the Site, the Services, or other Unbounce technology;
(j) copy, archive, store, reproduce, display, publish, or in any way distribute or create derivative works from all or any part of the Site or Services, without express authorization;
(k) access the Site or Services in order to build a product using similar ideas, features, functions, interfaces, or graphics as those found in the Site or Services;
(l) access the Site or Services in order to monitor their availability, performance, or functionality, or for any other benchmarking or competitive purposes;
(m) upload any Content, software, or code designed to: cause a security breach or override, interfere with the functionality or performance of the Site or Services, or prevent others from accessing or using the Site or Services;
(n) upload any single file larger than 500MB; or
(o) create more than 5,000 landing pages, without prior authorization.
Our Monitoring and Enforcement
We reserve the right, but do not assume the obligation, to monitor the Site and the Services (and any use of them), and to investigate any violation of this AUP or misuse of the Site or Services. Unbounce may, at our sole discretion and without liability:
(a) investigate violations of this AUP or misuse of the Site or Services; and/or
(b) remove, disable access to, or modify any content or resource that, in our sole determination, violates this AUP or any other agreement we have with you for use of the Site or Services.
We may report any activity that we suspect violates any law or regulation to law enforcement officials, regulators, or any other appropriate Third Party. Our reporting may include disclosing customer information. We also may cooperate with law enforcement agencies, regulators, or any other appropriate Third Party to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this AUP.