Acceptable Use Policy

  1. About this Acceptable Use Policy
    1. This Acceptable Use Policy (AUP) outlines acceptable and appropriate behaviours that are expected of any person who uses and/or accesses any of Pen CS Pty Limited (the Company)’s software or related services (End Users or you). 
    2. End Users must comply with this AUP and must not use, encourage, promote, facilitate, or instruct any person to breach this AUP. 
    3. End Users must act appropriately in all respects and must not display, store, distribute, transmit or otherwise make available communications or content via the Company’s software (the Software) and/or the Company’s services (the Services) that contains abusive, offensive, harmful or objectionable language, that has the quality to defame or libel others or that infringes on the privacy rights or other rights of others.  
    4. End Users must not view, download, copy, send, post or access information that is illegal, fraudulent or obscene when using or accessing any of the Software and/or Services, and must not use such software and services in any way prohibited by this AUP or that would otherwise cause the Company loss and/or damage and/or negatively affect its reputation, associated goodwill or cause it to fall into disrepute or cause it to fall into dispute with any third party.
  2. End User prohibitions 
    1. Without limiting the above provisions of this AUP, in the course of any End User using and/or accessing any Software and/or any Service of the Company, the following are strictly prohibited: 
      1. accessing any other person’s account other than the End User’s assigned account; 
      2. uploading any content about a person without their consent, where that consent is required under applicable law; 
      3. using the Software and/or Services to violate all or any legal rights of any person, company or other entity in any jurisdiction; 
      4. using the Software and/or Services in breach of the Privacy Act 1988 (Cth) or any other applicable data protection laws in any relevant jurisdiction (including any intentional access, creation, modification, transmission, distribution or storage of information, data or material in breach of applicable law); 
      5. utilising the Software and/or Services in connection with crimes such as theft and fraud; 
      6. using the Software and/or Services in breach of any laws, including but not limited to, laws protecting copyright, trade secrets, patents or other intellectual property, and laws relating to spam or privacy; 
      7. unauthorised copying of copyrighted material including, but not limited to, installing any copyrighted software for which you do not have an active licence; 
      8. using the Software and/or Services in the course of providing negligent or unlawful services; 
      9. violating domestic and international export control laws including by exporting software, technical information, encryption software, or technology in contravention of such laws; 
      10. any form of computer hacking or introduction of malicious programs into the Company’s or any of its service provider’s network, computer or servers (e.g., viruses, worms, Trojan horses, e-mail bombs, broadcast attacks or any other flooding techniques), or otherwise violating the security or integrity of any network computer or communications system, software application of the Company or its service providers; 
      11. revealing your account password to others or allowing unauthorised individuals to use the Software and/or Services, including for the purposes of attempting to probe, scan or test the vulnerability of an account or the Software; 
      12. using the Software and/or Services to offer or distribute counterfeit goods or services; 
      13. using the Software and/or Services to upload, store, display, transmit content that is invasive, defamatory and/or obscene; 
      14. using the Software and/or Services to carry out security breaches or disruptions of network communication is strictly prohibited. Security breaches include, but are not limited to, accessing data of which you are not an intended recipient or logging into a server or account that you are not expressly authorized to access or corrupting any data. For the purposes of this paragraph, “security breaches” includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes (except for the legitimate use of aliases and anonymous remailers, which is permitted); 
      15. using the Software and/or Services to execute any form of network monitoring or crawling which will intercept data not intended for you without permission; 
      16. using the Software and/or Services to circumvent user authentication or security of any of the Company’s hosts, networks or accounts or those of its customers or suppliers; 
      17. using the Software and/or Services to interfere with or deny service to anyone; 
      18. using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, any persons’ use of the Software and/or Services; 
      19. sending unsolicited email messages through or to users of the Software and/or Services in breach of the Spam Act 2003 (Cth); 
      20. using the Software and/or Services to send any form of harassment via email, or any other form of messaging, whether through language, frequency, or size of messages; 
      21. using the Software and/or Services to send email to any email address, with the intent to spam or harass; 
      22. operating network services like open proxies, open mail relays, or open recursive domain name servers; 
      23. using the Software and/or Services to create or forward “chain letters”, “Ponzi” or other “pyramid” schemes of any type; and 
      24. use of the Software and/or Services in breach of any person’s privacy (such as by way of identity theft or “phishing”).