Acceptable Use Policy

Last Updated: October 2020

When you use the Subscription Service you must not and you agree not to:

  1. Use the Subscription Service outside of the interfaces we have provided.
  2. Remove or alter notices, trademarks or logos provided with the Subscription Service.
  3. Infringe or violate the intellectual property rights (including copyrights), privacy rights or any other rights of anyone else (including Cloutlayer).
  4. Frame or mirror the Subscription Service or the Cloutlayer Content or reformat them in any way.
  5. Represent yourself as an entity that you do not own or control.
  6. Use of the Services to organize or encourage others to violate any law or regulation.
  7. Engage in any unsolicited advertising, marketing or other activities, including, without limitation, any activities that violate anti-spam laws and regulations.
  8. Attempt to access user accounts or Cloutlayer accounts that you are not authorized to access.
  9. Attempt, in any manner, to obtain the password, account, or other security information from any other user.
  10. Jeopardize the security of your Subscription Service account or anyone else's (such as allowing someone else to log on as you on the Subscription Service).
  11. Use the Subscription Service or Cloutlayer Content in any way that is designed or used to commit or facilitate any "phishing" attack.
  12. Introduce any keystroke logging or any other monitoring code into the Subscription Service.
  13. Post or upload any content or use the Subscription Service in such a way that, in our reasonable discretion, is likely to expose Cloutlayer to civil or criminal liability.
  14. Upload, transmit or introduce any virus, worm, defect, Trojan horse, time bombs, date bombs, adware, spyware, other malware or similar destructive or harmful item to or via the Subscription Service.
  15. Interfere with the operation or availability of the Subscription Service, or the hardware, software, infrastructure and networks used to operate the Subscription Service.
  16. Take any action that imposes or may impose (at our sole discretion) an unreasonable or disproportionately large load on our infrastructure.
  17. Use extreme bandwidth capacity in a way that threatens our infrastructure, including, but not limited to, overloading or attempting to overload the Subscription Service’s servers with any distributed denial of service (DDOS) or other overload method or attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
  18. Attempt to probe, scan, or test the vulnerability of a Subscription Service-related system or network or to breach any security or authentication measures used by a Subscription Service-related system or network, or to perform any security integrity review, penetration test, load test, denial of service simulation or vulnerability scan on any Subscription Service-related system or network.
  19. Use or develop any third-party applications that interact with the Subscription Service not in accordance with our Customer Terms of Service.
  20. Decompile, reverse engineer, or otherwise attempt to derive or gain access to the source code or underlying ideas or information of or relating to the Subscription Service.
  21. Modify, translate, adapt or otherwise create derivative works or improvements, of the Subscription Service or any content or source code.
  22. "Crawl" or "scrape" any page, data, or portion of or relating to the Subscription Service or any content available through the Subscription Services (through use of manual or automated means).
  23. Access or use the Subscription Service using any automated means.
  24. Post any content or use the Subscription Service that is, in our judgment, designed to function as a farming bitcoin, bit-torrenting, pirated software website or illegal or unlicensed software or 'warez' website or “tor relay” service or website.
  25. Violate any law or regulation, including (without limitation) possessing or disseminating child pornography, facilitating sex trafficking, stalking, troll storming, threatening imminent violence, death or physical harm to any individual or group whose individual members can reasonably be identified, or inciting violence.