Version Number: 2.0. Effective starting: 1 July 2024
This Acceptable Use Policy (“Policy”) applies to the use of Curiosity Group product and service offerings, including the Curiosity website, and any other products or websites that Curiosity may own or operate, and any other product or service from which this Policy is linked (collectively the “Products”). The Curiosity website is also subject to the Website Terms of Use.
This Policy is read together with the End User Licence Agreement (“Agreement”) between the applicable Curiosity Group legal entity and the customer/partner/user using or otherwise accessing the Products (“you”). This Policy is in addition to any other terms and conditions pursuant to which the Curiosity Group provides the Products to you.
Curiosity Group for the purpose of this Policy means Curiosity Software Ireland Limited (“Curiosity”), Curiosity Software Ireland Limited’s UK establishment, and Curiosity Software LLC, together with any entity that Curiosity owns, that owns Curiosity, or that is under common ownership with Curiosity, from time to time, collectively form part of the curiosity group (“Curiosity Group”, “Curiosity”, “we”). For the purpose of this Clause “Ownership” means direct or indirect control of 50% or more of the allotted shares able to vote for members of the board of directors or (ii) for an entity without shares, 50% or more of the ownership interest able to make decisions for the entity, or other third party at any time.
Curiosity may make reasonable modifications to this Policy from time to time by posting a new version of this document on the Curiosity website. Unless otherwise specified, revisions are effective immediately upon posting. Accordingly, we recommend that you visit the Curiosity website regularly to ensure that your activities conform to the most recent version of this Policy. Your continued access to, or use of, the Products on or after the effective date of any changes to this Policy constitutes your acceptance of any such updates.
Questions about this Policy (e.g., whether any contemplated use is permitted) and reports of violations of this Policy should be directed to CSILegal@curiosity.software
You agree not to use, and not to encourage or permit any person to use, the Products in a manner prohibited by this Policy. Prohibited uses and activities include, without limitation, any use of the Products in a manner that, in Curiosity’s reasonable judgment, involves, facilitates, or attempts any of the following:
Disruption
-
Tampering with, reverse-engineering, or hacking the Products circumventing any security or authentication measures, or attempting to gain unauthorized access to the Products, related systems, networks, or data;
-
Modifying, disabling, or compromising the integrity or performance of the Products or related systems, network or data;
-
Deciphering any transmissions to or from the servers running the Products; and / or
-
Overwhelming or attempting to overwhelm Curiosity infrastructure by imposing an unreasonably large load on Curiosity systems that consume extraordinary resources (CPUs, memory, disk space, bandwidth, etc.), such as:
-
Using “robots,” “spiders,” “offline readers,” or other automated systems to send more request messages to Curiosity servers than a human could reasonably send in the same period of time by using a normal browser;
-
Going far beyond the use parameters for any given service as described in its corresponding documentation; and / or
-
Consuming an unreasonable amount of storage for music, videos etc., in a way that’s unrelated to the purposes for which the services were designed.
Technical Restrictions
-
Accessing any third party computer or computer system, network, software, or data without their knowledge and consent; breaching the security of another user or system; or attempting to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts without express permission to do so;
-
Using or distributing tools or devices, material or other information, designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, viruses, ransomware, or Trojan horse programs;
-
Copying, distributing, or sublicensing any proprietary software provided in connection with the Products by Curiosity;
-
Distributing programs that make unauthorized changes to the Products;
-
Attempting to bypass or break any security mechanism on any of the Products, or using the Products in any other manner that poses a material security or service risk to Curiosity or any of its other customers;
-
Launching or facilitating, whether intentionally or unintentionally, any denial of service attack on any of the Products, or any other conduct that adversely impacts the availability, reliability, or stability of the Products; and / or
-
Altering, modifying, or tampering with the Products or permitting any other person to do the same who is not authorized by Curiosity.
Conduct
-
Violating any law of, or committing conduct that is tortuous or unlawful in, any applicable jurisdiction;
-
Displaying, performing, sending, receiving or storing any content that is obscene or excessively violent, or would reasonably be considered inappropriate, regardless of whether the material or its dissemination is unlawful;
-
Advocating or encouraging violence against any government, organization, group, individual or property, or providing instruction, information, or assistance in causing or carrying out such violence, regardless of whether such activity is unlawful;
-
Uploading, posting, publishing, transmitting, reproducing, creating derivative works of, or distributing in any way information, software or other material obtained through the Products or otherwise that is protected by copyright, trade secret or other intellectual property right, without obtaining any required permission of the owner;
-
Deleting or altering author attributions, copyright notices, or trademark notices, unless expressly permitted in writing by the owner;
-
Obtaining unauthorized access to any system, network, service, or account;
-
Interfering with service to any user, site, account, system, or network by use of any program, script, command, or otherwise;
-
Evading spam filters, or sending or posting a message or email with deceptive, absent, or forged header or sender identification information;
-
Transmitting unsolicited bulk or commercial messages commonly known as “spam;”
-
Sending large numbers of copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or large messages or files that disrupts a server, account, blog, newsgroup, chat, or similar service;
-
Participating in the collection of large numbers of email addresses, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;
-
Falsifying, altering, or removing message headers; or
-
Impersonating any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”).
Curiosity reserves the right to interpret this Policy and take (or refrain from taking) action in its discretion. Without affecting any other remedies available to Curiosity, Curiosity may terminate or suspend a user’s account or access to the Products, without notice or liability if Curiosity (in its discretion) determines that a user has violated this Acceptable Use Policy. You agree to cooperate with Curiosity to investigate and remedy any violation.