← Back to Terms

Yottabyte Acceptable Use Policy

This Acceptable Use Policy (the “Policy”) describes prohibited uses of the website, software and services (collectively, the “Services”) offered by Yottabyte, LLC (“Yottabyte”, “Us”, “We” or “Our”). Your use of the Yottabyte Services is subject to this Policy and any agreements between you and Yottabyte governing your use of the Services, including as applicable the end user license agreement, terms of service, acceptable use policy or storage services agreement. If you violate the Policy or authorize or help others to do so, Yottabyte, may, in its sole discretion, suspend or terminate your use of the Yottabyte Services, without notice and liability. Additionally, Yottabyte reserves the right, but is not obligated, to remove any of your content that Yottabyte believes violates this Policy.

We may modify this Policy at any time by posting a revised version at www.yottabyte.com. Any examples described in this policy are not exhaustive and are in addition to the prohibited conduct described in the end user license agreement, terms of service, acceptable use policy or storage services agreement or any other agreement between you and Yottabyte governing your use of the Services. BY ACCESSING YOTTABYTE’S SITE OR USING THE SERVICES OFFERED BY YOTTABYTE, YOU AGREE TO BE LEGALLY BOUND BY THE TERMS OF THIS POLICY.

PROHIBITED ACTIONS

You agree not to misuse the Yottabyte Services. For example, you must not, and must not attempt to, use the Services to do the following or to assist another to do any of the following.

No Illegal, Harmful, or Offensive Use or Content
You may not use, or instruct, help or permit others to use, the Services for any illegal, harmful or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful or offensive. Such prohibited activities may include:

  • Any illegal activities, including advertising, transmitting or otherwise making available gambling sites or services or disseminating or promoting materials that are unlawfully pornographic or indecent.

  • Sending, uploading, distributing or disseminating any defamatory, harassing, abusive, fraudulent, obscene or otherwise objectionable content.

  • Engaging in activities that may be deceptive or harmful to others or to Yottabyte’s operations or reputation.

  • Using, storing, disseminating or accessing content that infringes or misappropriates the intellectual property or proprietary rights of others.

  • Transmitting, distributing or storing content or other computer technology that may damage, interfere with, intercept or expropriate any system, program or data, including viruses, worms, defects, Trojan horses, corrupted files, hoaxes or other items of a destructive or deceptive nature.

  • Transmitting, distributing or storage of any material or content of any material in violation of any applicable law or regulation, including without limitation, the unauthorized use of materials protected by copyright, patent, trade secret or other intellectual property laws, or violation of export control laws.

No Network Abuse or Security Violations
You may not use the Services to violate the security or integrity of any network, computer, communication system or computing device. You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Violations of system or network security may result in civil or criminal penalties. Prohibited activities include:

  • Accessing or using the Services or any part of the system without permission, including attempting to probe, scan or test the vulnerability of any system or network.

  • Monitoring data or traffic on a system or network without permission or monitoring or crawling of a system or network that impairs or disrupts the system or network.

  • Sending unsolicited communications, promotions, advertisements or spam.

  • Sending altered, deceptive or false source identifying information, including “spoofing” or “phishing”.

  • Interfering with or disrupting any user, system or network, for example by sending a virus, overloading, flooding, spamming or mail-bombing any part of the Services.

  • Using manual or electronic means to avoid any limitations placed on a system or network, such as access and storage restrictions, or to breach or circumvent any security or authentication measures.

MONITORING AND ENFORCEMENT

Yottabyte may, but is not obligated to, investigate any violation of this Policy or misuse of the Services. Yottabyte may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties and may cooperate with those entities or individuals to help with an investigation or prosecution of illegal conduct. Yottabyte may use or disclose any customer information, personal information or network and systems information related to alleged violations of this Policy to law enforcement officials, regulators or other appropriate third parties.

REPORTING SECURITY BREACHES AND POLICY VIOLATIONS TO YOTTABYTE

If you become aware of any violation of this Policy, you agree to immediately notify Yottabyte and provide Yottabyte with assistance, as requested, to stop or remedy the violation. You also agree to promptly notify Yottabyte of any breach of security related to the services or software provided by Yottabyte, including but not limited to unauthorized use of your password or account.

To report any violation of this Policy or breach of security, please contact Yottabyte via email at: terms@yottabyte.com.

Last updated: October 24, 2012