Morro Systems Acceptable Use Policy

Last updated: February 13, 2017

You agree to not misuse the Morro Systems products, websites and services (“Services”) or encourage or assist anyone else to do so. You are responsible for Users compliance with these Terms and for the quality, accuracy and legality of the Content. You will not and will ensure that your Users do not:

  • do anything illegal;
  • use the Services in any manner or for any purpose other than as expressly permitted by this Policy, the Privacy Policy, any User Guides or any other policy, instruction or terms applicable to the Services that are available on the Services (“Terms”);
  • modify, tamper with or otherwise create derivative works of the Services, reverse engineer, disassemble or decompile the software used to provide or access the Services, or attempt to discover or recreate the source code used to provide or access the Services, except and only to the extent that the applicable law expressly permits doing so;
  • alter, remove, or obscure any proprietary rights notice related to the Services;
  • cause, in Morro Systems sole discretion, inordinate burden on the Services or Morro Systems resources or capacity;
  • damage, disable, overburden, or impair the Services, interfere with or disrupt servers or networks connected to the Services or interfere with or disrupt the access by other Morro Systems customers to the servers or networks, or violate the regulations, policies or procedures of those networks;
  • share passwords or other access information or devices or otherwise enable any unauthorized third party to access or use the software or the Services;
  • probe, scan, or test the vulnerability of any system or network;
  • breach or otherwise circumvent any security or authentication measures;
  • access, tamper with, or use non-public areas or parts of the Services, or shared areas of the Services you haven’t been invited to;
  • access or attempt to access Morro Systems other accounts, computer systems or networks not covered by these Terms, through password mining or any other means;
  • interfere with or disrupt any user, host, or network by, for example, sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services;
  • use the Services to store or transmit viruses, worms, time bombs, Trojan horses or other harmful or malicious code, files, scripts, agents or programs;
  • use the Services to send unsolicited or unauthorized junk mail, spam, chain letters, pyramid schemes or any other form of duplicative or unsolicited messages;
  • send altered, deceptive or false source-identifying information, including “spoofing” or “phishing”;
  • promote or advertise products or services other than your own without appropriate authorization;
  • rent, lend, sell, resell, lease, or sublicense the Services to any third party unless specifically authorized to do so;
  • access or use the Services in a way intended to avoid incurring fees, exceeding usage limits, circumventing storage space limits and the like;
  • access, search, or create accounts for the Services by any means other than our publicly supported interfaces (for example, “scraping” or creating accounts in bulk);
  • abuse referrals or promotions to get more storage space than deserved;
  • store, transmit, publish or share materials: (i) containing unlawful, defamatory, threatening, pornographic, abusive, or libelous material, or that contain extreme acts of violence or terrorist content (ii) containing any material that encourages conduct that could constitute a criminal offense, or (iii) that violates the intellectual property rights or rights to the publicity or privacy of others;
  • advocate bigotry or hatred against any person or group of people based on their race, religion, ethnicity, sex, gender identity, sexual preference, disability, or impairment or infringe upon the rights of others; and
  • use the Services to harm others or the Services or engage in any activity that harms, exploits, or threatens harm to children;
  • use the Services in connection with the operation of nuclear facilities, aircraft navigation, communication systems, medical devices, air traffic control devices, real time control systems or other situations in which the failure of the Services could lead to death, personal injury, or physical property and environmental damage.
Book a Demo
Contact Us