Acceptible Use Policy

4IQ Acceptable Use Policy

Effective 14 Feb 2018

Overview and Changes to this Policy

We’re constantly trying to improve our Services, so we may need to change this Acceptable Use Policy from time to time as well, but we will alert you to changes by placing a notice on the Services, by sending you an email, and/or by some other means. Please note that if you’ve opted not to receive legal notice emails from us (or you haven’t provided us with your email address), those legal notices will still govern your use of the Services, and you are still responsible for reading and understanding them. If you use the Services after any changes to the Acceptable Use Policy have been posted, that means you agree to all of the changes.

This Acceptable Use Policy (the “Policy”) applies to all users of the services provided by 4IQ, Inc. (the “Services”). By clicking the box you expressly declare that you have read and understood this Policy and that you fully accept it. This Policy prohibits uses and activities involving the Services that are illegal, infringe the rights of others, interfere with or diminish the use of the Services by others, or otherwise adversely affect the Services or 4IQ. If you violate this Policy, we may suspend or terminate your account. We may also suspend or terminate accounts where we see behavior, content, or other factors that poses a threat to our system. If you are using the Services on behalf of an end user customer, you are responsible for such end user’s use of the Services and you agree, and shall cause the end user customer to agree, to use the Services in accordance with this Policy.

The Services do not constitute a “consumer report” for purposes of the Fair Credit Reporting Act (“FCRA”) or any other applicable legislation in the matter. You may not use the Services in whole or in part as a factor in determining consumer eligibility for credit, insurance, employment, tenancy, or any another FCRA purpose.

Additionally, when you use the Services, you must not do any of the following:

Conduct and information restrictions

  • Undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening or defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, or otherwise violate any local, state, federal, or non-U.S. law, order, or regulation;

  • Obtain, export, move or copy any data, information or material you do not have the right to, or which was obtained using the Service for unlawful purpose;

  • Attempt, in any manner, to obtain the password, account, or other security information from any other user;

  • Upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining any required permission of the owner;

  • Participate in the collection of very large numbers of e-mail addresses, phone numbers, screen names, or other identifiers of others (without their prior consent), a practice sometimes known as spidering or harvesting, or participate in the use of software (including “spyware”) designed to facilitate this activity;

  • Impersonate any person or entity, engage in sender address falsification, forge anyone else’s digital or manual signature, or perform any other similar fraudulent activity (for example, “phishing”).

Technical restrictions

  • Use extreme bandwidth capacity in a way that threatens our infrastructure;

  • Upload viruses or malware or attempt to overload the system with email or traffic;

  • Use or distribute tools or devices designed or used for compromising security or whose use is otherwise unauthorized, such as password guessing programs, decoders, password gatherers, keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Unauthorized port scanning is strictly prohibited;

  • Copy, distribute, or sublicense any proprietary software provided in connection with the Services;

  • Distribute programs that make unauthorized changes to software (cracks);

  • Alter, modify, or tamper with the Service or permit any other person to do the same who is not authorized by 4IQ;

  • Decompile, reverse engineer, or otherwise attempt to obtain the source code or underlying ideas or information of or relating to the Services.

Network and usage restrictions

  • Restrict, inhibit, or otherwise interfere with the ability of any other entity, to use the Service, including posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to use, send, or retrieve information;

  • Restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation to the Service or any 4IQ (or 4IQ supplier) host, server, backbone network, node or service;

  • Interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abusing operator privileges, and attempts to “crash” a host.

A violation of any of the foregoing is grounds for termination of your right to use or access the Services without prejudice to 4iQ’s right to claim damages.