ACCEPTABLE USE POLICY
ScholarshipsGrants.org, and its subsidiaries, divisions and related web sites (hereinafter collectively referred to as “ScholarshipsGrants.org”) Acceptable Use Policy ("AUP") describes the proper kinds of conduct and prohibited uses of ScholarshipsGrants.org’s services (the "Services"), as described and subscribed to pursuant to the applicable Terms and Conditions. The AUP is not exhaustive and ScholarshipsGrants.org reserves the right to modify the AUP at any time, effective upon posting of the modified AUP to ScholarshipsGrants.org. By registering for and using the Services, and thereby accepting the terms and conditions of the Agreement, you agree to abide by the AUP as modified from time to time. Any violation of the AUP may result in the suspension or termination of your account and such other action as ScholarshipsGrants.org deems appropriate. 1. YOUR GENERAL RESPONSIBILITIES
2. ILLEGAL OR HARMFUL USE
Infringement. Infringement of intellectual property rights or other proprietary rights including, without limitation, material protected by copyright, trademark, patent, trade secret, or other intellectual property right used without proper authorization. Infringement may result from, among other activities, the unauthorized copying and posting of pictures, logos, software, articles, musical works, and videos. Offensive Materials. Transmission, disseminating, sale, storage or hosting material that is unlawful, libelous, defamatory, obscene, pornographic, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory or otherwise objectionable. Export Violations. Posting or sending of software or technical information in violation of U.S. export laws, including, without limitation, the Export Administration Act and the Export Administration Regulations maintained by the Department of Commerce. Harmful Content. Disseminating or hosting harmful content including, without limitation, viruses, Trojan horses, worms, time bombs, cancelbots or any other computer programming routines that may damage, interfere with, surreptitiously intercept or expropriate any system, program, data or personal information. Fraudulent Conduct. Offering or disseminating fraudulent goods, services, schemes, or promotions (i.e., make money fast schemes, chain letters, pyramid schemes), or furnishing false data on any signup form, contract or online application or registration, or the fraudulent use of any information obtained through the use of the Services, including without limitation use of credit card numbers. 3. SYSTEM AND NETWORK SECURITY AND INTEGRITY
Hacking. Unauthorized access to or use of data, systems, servers or networks, including any attempt to probe, scan or test the vulnerability of a system, server or network or to breach security or authentication measures without express authorization of the owner of the system, server or network. Interception. Unauthorized monitoring of data or traffic on any network, server, or system without express authorization of the owner of the system, server, or network. Intentional Interference. Interference with service to any user, host or network including, without limitation, mail bombing, news bombing, other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any activity resulting in the crash of a host. Intentional interference also means the use of any kind of program/script/command, or send messages of any kind, designed to interfere with a user's terminal session, via any means, locally or by the Internet. Falsification of Origin. Forging of any TCP-IP packet header, e-mail header or any part of a message header. This prohibition does not include the use of aliases or anonymous remailers. Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on the Services such as timing out. Failure to Safeguard Accounts. Failing to prevent unauthorized access to accounts, including any account passwords. © 2009 ScholarshipsGrants.org Updated: July 17, 2009 |