Bytesbox Acceptable Use Policy

To uphold the quality and reputation of Bytesbox products and services, your use of Bytesbox (the "Service") is subject to these Acceptable Use policies. If you are found to be in violation of our policies at any time, as determined by Bytesbox in its sole discretion, we may warn you or suspend or terminate your account. Please note that we may change our program policies at any time, and pursuant to the Bytesbox Terms of Service (the "Terms"), it is your responsibility to keep up-to-date with and adhere to the policies posted here. All capitalized terms used herein have the meanings stated in the Terms, unless stated otherwise.

Prohibited Content

The Content displayed and/or processed through your Application or other web site utilizing the Service shall not contain any of the following types of content:

  • Content that infringes a third party's rights (e.g., copyright) according to applicable law;
  • Hate-related or violent content;
  • Content advocating racial or ethnic intolerance;
  • Content intended to advocate or advance computer hacking or cracking;
  • Other illegal activity, including without limitation illegal export of controlled substances or illegal software;
  • Phishing;
  • Malicious content;
  • Other material, products or services that violate or encourage conduct that would violate any criminal laws, any other applicable laws, or any third-party rights.

Prohibited Actions

In addition to (and/or as some examples of) the violations described in the Terms, you may not and may not allow any third party, including your end users, to:

  • Send, upload, distribute or disseminate or offer to do the same with respect to any unlawful, defamatory, harassing, abusive, fraudulent, infringing, obscene, or otherwise objectionable content
  • Modify, adapt, translate, or reverse engineer any portion of the Service;
  • Remove any copyright, trademark or other proprietary rights notices contained in or on the Service;
  • Modify the Bytesbox logo or any other Bytesbox Brand Features.
  • probe, scan, or test the vulnerability of any system or network;
  • breach or otherwise circumvent any security or authentication measures;
  • access, tamper with, or use non-public areas or parts of the Services, or shared areas of the Services you haven't been invited to;
  • interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services;
  • access, search, or create accounts for the Services by any means other than our publicly supported interfaces (for example, "scraping" or creating accounts in bulk);
  • send altered, deceptive or false source-identifying information, including "spoofing" or "phishing";
  • promote or advertise products or services other than your own without appropriate authorization;
  • abuse referrals or promotions to get more storage space than deserved;
  • circumvent features limits;
  • advocate bigotry or hatred against any person or group of people based on their race, religion, ethnicity, sex, gender identity, sexual preference, disability, or impairment;
  • violate the law in any way, including storing, publishing or sharing material that's fraudulent, defamatory, or misleading; or