{"id":2301,"date":"2024-05-09T13:59:10","date_gmt":"2024-05-09T13:59:10","guid":{"rendered":"https:\/\/www.bloomreach.com\/legal\/acceptable-use-policy-old"},"modified":"2024-09-12T12:51:58","modified_gmt":"2024-09-12T12:51:58","slug":"acceptable-use-policy-old","status":"publish","type":"legal","link":"https:\/\/www.bloomreach.com\/en\/legal\/acceptable-use-policy-old","title":{"rendered":"Bloomreach Cloud Acceptable Use Policy"},"content":{"rendered":"<section>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-12\">\n                <!--content start--><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 18pt;  color: rgb(16, 24, 50); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">BloomReach Cloud Acceptable Use Policy (AUP)<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">The acceptable use policy (the &quot;AUP&quot;) specifies guidelines for users of BloomReach&rsquo;s services. BloomReach&rsquo;s subscribers (&ldquo;You&rdquo; or &ldquo;Your&rdquo;) are obligated to use BloomReach&rsquo;s services as agreed to in Your subscription agreement with BloomReach, in compliance with BloomReach&rsquo;s documentation and according to the AUP. Use of the services may be suspended or terminated for violation of this AUP in accordance with the BloomReach terms and conditions of service. Inquiries regarding this policy should be directed to&nbsp;<\/span><a href=\"mailto:infrastructure@bloomreach.com\" style=\"text-decoration-line: none;\"><span style=\"font-size: 12pt;  color: rgb(24, 189, 222); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; text-decoration-line: underline; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">infrastructure@bloomreach.com<\/span><\/a><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">1. Acceptable Use Policy.<\/span><br \/>\n                <span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">BloomReach&rsquo;s services shall not be used by any person or entity: &nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">a. In any way that violates any applicable federal, state, local, or international law or regulation;&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">b. To engage in, foster, or promote illegal, abusive, or irresponsible behavior;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">c. To obtain unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">d. To monitor data or traffic on any network or system without the express authorization of the owner of the system or network;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">e. To Interfere with service to any user of the BloomReach services or other network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">f. To use an Internet account or computer without the owner&#39;s authorization;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">g. To collect or using email addresses, screen names or other identifiers without the consent of the person identified (including, without limitation, phishing, Internet scamming, password robbery, spidering, and harvesting);<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">h. To collect or using information without the consent of the owner of the information;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">i. To use of any false, misleading, or deceptive TCP-IP packet header information in an email or a newsgroup posting;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">j. To use of the service to distribute software that covertly gathers information about a user or covertly transmits information about the user;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">k. For the use of the service for distribution of advertisement delivery software unless: (i) the user affirmatively consents to the download and installation of such software based on a clear and conspicuous notice of the nature of the software, and (ii) the software is easily removable by use of standard tools for such purpose included on major operating systems; (such as Microsoft&#39;s &quot;ad\/remove&quot; tool); or<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">l. For any conduct that is likely to result in retaliation against the BloomReach services, network or website, or the BloomReach&#39;s employees, officers or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS).<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">2. Excessive Use of System Resources.<\/span><br \/>\n                <span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">You may not use the BloomReach services in a way that unnecessarily interferes with the normal operation of the BloomReach services generally. In such circumstances, we may require You to repair abnormalities in Your code if the operation of the code unnecessary conflicts with other customers&#39; use of their BloomReach services.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">3. Bulk or Commercial E-Mail.&nbsp;<\/span><br \/>\n                <span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">You must obtain BloomReach&#39;s advance approval for any bulk or commercial e-mail, which will not be given unless You are able to demonstrate, at a minimum, that:<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">a. Your intended recipients have given their consent to receive e-mail via some affirmative means, such as an opt-in procedure;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">b. Your procedures for soliciting consent include reasonable means to ensure that the person giving consent is the owner of the e-mail address for which the consent is given;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">c. You retain evidence of the recipient&#39;s consent in a form that may be promptly produced on request, and You honor the recipient&#39;s and BloomReach&#39;s requests to produce consent evidence within 72 hours of receipt of the request;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">d. You have procedures in place that allow a recipient to revoke their consent &ndash; such as a link in the body of the email, or instructions to reply with the word &quot;Remove&quot; in the subject line; You honor revocations of consent within 48 hours, and You notify recipients that the revocation of their consent will be implemented in 48 hours;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">e. You must post an email address for complaints (such as abuse@yourdomain.com) in a conspicuous place on any website associated with the email, You must register that address at abuse.net, and You must promptly respond to messages sent to that address;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">f. You must have a Privacy Policy posted for each domain associated with the mailing;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">g. You have the means to track anonymous complaints;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">h. You must not obscure the source of Your e-mail in any manner. Your e-mail must include the recipient&#39;s e-mail address in the body of the message or in the &quot;TO&quot; line of the e-mail;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">i. You must not attempt to send any message to an email address if 3 consecutive delivery rejections have occurred and the time between the third rejection and the first rejection is longer than fifteen days.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">j. These policies apply to messages sent using the BloomReach services, or to messages sent from any network by You or any person on Your behalf that directly or indirectly refer the recipient to a site hosted via the BloomReach services. In addition, You may not use a third party e-mail service that does not practice similar procedures for all its customers. These requirements apply to distribution lists created by third parties to the same extent as if the list were created by You.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">k. BloomReach may test and otherwise monitor Your compliance with its requirements, including requesting opt-in information from a random sample of Your list at any time. In addition, BloomReach may block the transmission of email that violates these provisions.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">4. Mail Relays<\/span><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">.&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">Generally, we do not allow bulk or commercial e-mail to be sent to more than five-thousand (5,000) users per day at a rate of 250 messages every 20 minutes. If You would like to send more than 5,000 messages per day, please contact a member of our support team for additional information.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">5. Vulnerability Testing.<\/span><br \/>\n                <span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">You may not attempt to probe, scan, penetrate or test the vulnerability of a BloomReach services, system or network or to breach the BloomReach&#39;s security or authentication measures, whether by passive or intrusive techniques, without BloomReach&#39;s express written consent.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">6. Offensive Content.&nbsp;<\/span><br \/>\n                <span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">You may not publish, transmit or store on or via the BloomReach&#39;s network and equipment any content or links to any content that::<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">a. Violates any law or suggests illegal activity<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">b. Contains pornography content&nbsp;&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">c.&nbsp; Is excessively violent, incites violence or threatens violence or contains harassing content or hate speech<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">d. Is defamatory or violates a person&#39;s privacy;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">e. Creates a risk to a person&#39;s safety or health, creates a risk to public safety or health, compromises national security or interferes with a investigation by law enforcement;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">f. Improperly exposes trade secrets or other confidential or proprietary information of another person;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">g. Is intended to assist others in defeating technical copyright protections;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">h. Infringes on another person&#39;s copyright, trade or service mark, patent or other property right;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">i. Is otherwise malicious, fraudulent or may result in retaliation against BloomReach by offended viewers.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">Content &quot;published or transmitted&quot; via the BloomReach&#39;s network or equipment includes web content, email, bulletin board postings, chat and any other type of posting or transmission that relies on the internet.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">7. Copyrighted Material<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">You may not use the BloomReach&#39;s network or services to download, publish, distribute, or otherwise copy or use in any manner any text, music, software, art, image or other work protected by copyright law unless:<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">a. You have been expressly authorized in writing by the owner of the copyright for the work to copy the work in that manner; or<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">b. You are otherwise permitted by established copyright law to copy the work in that manner.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">It is BloomReach&#39;s policy to terminate in appropriate circumstances the services of customers who are repeat infringers.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-weight: 700; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">8. Other<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">You must have valid and current information on file with Your domain name registrar for any domain hosted on the BloomReach&rsquo;s network.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">a. You may only use IP addresses assigned to You by BloomReach in connection with Your the BloomReach services.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">b. You agree that if the BloomReach IP numbers assigned to Your account are listed on an abuse database like Spamhaus, You will be in violation of this AUP, and BloomReach may take reasonable action to protect its IP numbers, including suspension and\/or termination of Your service, regardless of whether the IP numbers were listed as a result of Your actions;<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">c. You agree that we may quarantine or delete any data stored on a shared system if the data is infected with a virus, or is otherwise corrupted, and has the potential to infect or corrupt the system or other customers&#39; data that is stored on the same system.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\"><span style=\"font-size: 12pt;  color: rgb(94, 98, 110); background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">BloomReach, Inc. &#8211; February 19, 2019<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.6; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 14pt;\"><span id=\"docs-internal-guid-6a8773f5-7fff-9071-9b31-0938f22a0565\">&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>                <!--content end-->\n            <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n","protected":false},"parent":0,"menu_order":0,"template":"","class_list":["post-2301","legal","type-legal","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bloomreach.com\/en\/wp-json\/wp\/v2\/legal\/2301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bloomreach.com\/en\/wp-json\/wp\/v2\/legal"}],"about":[{"href":"https:\/\/www.bloomreach.com\/en\/wp-json\/wp\/v2\/types\/legal"}],"version-history":[{"count":0,"href":"https:\/\/www.bloomreach.com\/en\/wp-json\/wp\/v2\/legal\/2301\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bloomreach.com\/en\/wp-json\/wp\/v2\/media?parent=2301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}