235 E. Broadway Ste. 506

Long Beach, CA 90802

Like us.

Acceptable Use Policy

CritiqueIt Acceptable Use Policy v1.0

This Acceptable Use Policy (“AUP”) outlines acceptable uses of the CritiqueIt Service. This AUP prohibits uses and activities involving the CritiqueIt Service that are illegal, infringe on the rights of others, or interfere with or diminish the use and enjoyment of the CritiqueIt Service by others. For example, these prohibited uses and activities include, but are not limited to, using the CritiqueIt Service to:

  1. Conduct and Information Restrictions

1.1.1. Undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening or defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, or otherwise violate any local, state, federal, or non-U.S. law, order, or regulation;

1.1.2. Transmit unsolicited bulk or commercial messages commonly known as “spam;”

1.1.3. Send very large numbers of copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files that disrupts a server, account, blog, newsgroup, chat, or similar service;

1.1.4. Participate in the collection of very large numbers of e-mail addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;

1.1.5. Falsify, alter, or remove message headers;

1.1.6. Impersonate any person or entity, engage in sender address falsification, forge anyone else’s digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”).

1.2. Technical Restrictions

1.2.1. Access any other person’s computer or computer system, network, software, or data without his or her knowledge and consent; breach the security of another user or system; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for You, logging into or making use of a server or account You are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so;

1.2.2. Use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited;

1.2.3. Copy, distribute, or sublicense any proprietary software provided in connection with the CritiqueIt Service;

1.2.4. Distribute programs that make unauthorized changes to the CritiqueIt Service;

1.2.5. Alter, modify, or tamper with the CritiqueIt Service or permit any other person to do the same who is not authorized by Us.

1.3. Network and Usage Restrictions

1.3.1. Restrict, inhibit, or otherwise interfere with the ability of any other Entity, to use or enjoy the CritiqueIt Service, including posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send, or retrieve information;

1.3.2. Restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation to the CritiqueIt Service or any CritiqueIt host, server, backbone network, node or service, or otherwise cause a performance degradation to any CritiqueIt (or CritiqueIt supplier) facilities used to deliver the CritiqueIt Service;

1.3.3. Interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host.

  1. Consequences

2.1. We reserve the right to suspend immediately your access to the CritiqueIt Service in the event of any violation of the CritiqueIt AUP and to disclose information as required by law.

  1. Changes to the policy

3.1. This policy may be updated from time to time.  Updates will become effective as soon as they are published at www.critiqueit.com If there are any material changes to these policies, active users will be notified by email prior to the change being published and becoming effective. Users’ continued use of CritiqueIt Services or websites constitutes your agreement to be bound by such changes to the policy. Your only remedy, if you do not accept the updated terms of a CritiqueIt policy, is to discontinue use of the CritiqueIt Service and CritiqueIt websites.

Last updated May 25, 2017


Comments are closed.