1.1 This acceptable use policy (the “Policy“) sets out the rules governing:
(a) the use of Dycam at http://www.dycam.com (the “Services“); and
(b) the transmission, storage and processing of content by you, or by any person on your behalf, using the Services (“Content“).
1.2 References in this Policy to “you” are to any customer for the Services and any individual user of the Services (and “your” should be construed accordingly); and references in this Policy to “us” are to Dycam (and “we” and “our” should be construed accordingly).
1.3 By using the Services, you agree to the rules set out in this Policy.
- General usage rules
2.1 You must not use the Services in any way that causes, or may cause, damage to the Services or impairment of the availability or accessibility of the Services.
2.2 You must not use the Services:
(a) in any way that is unlawful, illegal, fraudulent or harmful; or
(b) in connection with any unlawful, illegal, fraudulent or harmful purpose or activity.
2.3 You must ensure that all Content complies with the provisions of this Policy.
- Unlawful Content
3.1 Content must not be illegal or unlawful, must not infringe any person’s legal rights, and must not be capable of giving rise to legal action against any person (in each case in any jurisdiction and under any applicable law).
3.2 Content, and the use of Content by us in any manner licensed or otherwise authorised by you, must not:
(a) be libellous or maliciously false;
(b) be obscene or indecent;
(c) infringe any copyright, moral right, database right, trade mark right, design right, right in passing off, or other intellectual property right;
(d) infringe any right of confidence, right of privacy or right under data protection legislation;
(e) constitute negligent advice or contain any negligent statement;
(f) constitute an incitement to commit a crime, instructions for the commission of a crime or the promotion of criminal activity;
(g) be in contempt of any court, or in breach of any court order;
(h) constitute a breach of racial or religious hatred or discrimination legislation;
(i) be blasphemous;
(j) constitute a breach of official secrets legislation; or
(k) constitute a breach of any contractual obligation owed to any person.
- Graphic material
4.1 Content must be appropriate for all persons who have access to or are likely to access the Content in question, and in particular for children over 12 years of age.
4.2 Content must not depict violence in an explicit, graphic or gratuitous manner.
4.3 Content must not be pornographic or sexually explicit.
- Negligent advice
6.1 Content must not consist of or contain any legal, financial, investment, taxation, accountancy, medical or other professional advice, and you must not use the Services to provide any legal, financial, investment, taxation, accountancy, medical or other professional advisory services.
6.2 Content must not consist of or contain any advice, instructions or other information that may be acted upon and could, if acted upon, cause death, illness or personal injury, damage to property, or any other loss or damage.
7.1 Content must be appropriate, civil and tasteful, and accord with generally accepted standards of etiquette and behaviour on the internet.
7.2 Content must not be offensive, deceptive, threatening, abusive, harassing, menacing, hateful, discriminatory or inflammatory.
7.3 Content must not be liable to cause annoyance, inconvenience or needless anxiety.
7.4 You must not use the Services to send any hostile communication or any communication intended to insult, including such communications directed at a particular person or group of people.
7.5 You must not use the Services for the purpose of deliberately upsetting or offending others.
7.6 You must not unnecessarily flood the Services with material relating to a particular subject or subject area, whether alone or in conjunction with others.
7.7 You must ensure that Content does not duplicate other content available through the Services.
7.8 You must ensure that Content is appropriately categorised.
7.9 You should use appropriate and informative titles for all Content.
7.10 You must at all times be courteous and polite to other users of the Services.
- Marketing and spam
8.1 You must not without our written permission use the Services for any purpose relating to the marketing, advertising, promotion, sale or supply of any product, service or commercial offering.
8.2 Content must not constitute or contain spam, and you must not use the Services to store or transmit spam – which for these purposes shall include all unlawful marketing communications and unsolicited commercial communications.
8.3 You must not send any spam or other marketing communications to any person using any email address or other contact details made available through the Services or that you find using the Services.
8.4 You must not use the Services to promote or operate any chain letters, Ponzi schemes, pyramid schemes, matrix programs, “get rich quick” schemes or similar letters, schemes or programs.
9.1 You must not use the Services for any purpose relating to gambling, gaming, betting, lotteries, sweepstakes, prize competitions or any gambling-related activity.
- Data mining
11.1 You must not conduct any systematic or automated data scraping, data mining, data extraction or data harvesting, or other systematic or automated data collection activity, by means of or in relation to the Services.
12.1 You must not link to any material using or by means of the Services that would, if it were made available through the Services, breach the provisions of this Policy.
- Harmful software
13.1 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies.
13.2 The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer.