This Acceptable Use Policy (“Policy”) defines required actions and practices, as well as prohibited activities and content pertaining to your use of E2open® Software as a Service (SaaS) that support the use of any product or service created, developed, sold, licensed, delivered, supplied or performed by E2open and third party software products (collectively, “software and services”). The examples listed in this policy are not exhaustive. If you violate the Policy or authorize or help others to do so, we may immediately suspend or terminate your use of the software and services. E2open reserves the right to remove any content or restrict or terminate the use of the software and services without prior notice for activities or content that, in E2open’s reasonable judgment, violate this policy or any agreement pursuant to which you use the services. E2open may change this policy from time to time by posting the updated policy on its web site (http://www.e2open.com and all related sites operated by or for E2open). You are deemed to accept a change to this policy upon your continued use of the software and services following any such change. If you do not accept this policy, you may not access or use any of the software and services.
Prohibited Activities and Content
When users disseminate information through the Internet, they also must keep in mind that E2open does not review, edit, censor, or take responsibility for any information its users may create. When users place information on the Internet, they have the same liability as other authors for copyright infringement, defamation, and other harmful speech. Also, because the information they create is carried over E2open’s network and may reach a large number of people, including both subscribers and non-subscribers of E2open. Users’ postings to the Internet may affect other users and may harm E2open’s goodwill, business reputation, and operations. In doing so, user may violate this Policy and/or the Master Services Agreement between the parties to which this policy is an Exhibit, when Customer, its users, affiliates, or subsidiaries engage in, or attempt to engage in, the following prohibited activities.
You may not use the software and services or permit others to use the software and services:
- to violate any law of any applicable jurisdiction, including, without limitation, laws governing antitrust, encryption, export/import control, intellectual property, copyright, trademark, obscenity, privacy, securities, gambling, and telecommunications;
- to commit any tortious or wrongful act;
- to post, send, receive, use, encourage, promote, facilitate or instruct others to use defamatory, harassing, libelous, obscene, abusive, deceptive, false, misleading, fraudulent, pornographic or threatening materials, or private information without the consent of the individual(s) involved;
- to post, send or receive any content, including, without limitation, text, graphics, images, computer programs, links and “meta tags,” that violates any copyright, patent, trademark, trade secret or other intellectual property right of a third party;
- to obtain or attempt to obtain unauthorized access to any server, system, network or account;
- to interfere or attempt to interfere with the provision of software and services to any user, host, or network by use of any program, script or otherwise;
- to interfere or attempt to interfere with security-related features of our software and services, or features that limit or restrict (a) use of our software and services or (b) use or copying of any content accessible through use of our software and services;
- Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions;
- Monitoring of data or traffic on a system without permission;
- to send unsolicited bulk and/or commercial messages over the Internet (known as “spamming”)
- to send, receive or use malware, spyware, adware, key loggers, viruses, worms, harmful code and/or Trojan horses, or Internet Relay Chat “bots”;
- to engage in “hacking”, “cracking”, mail bombing, port scanning, denial of service, or other malicious or destructive activities, whether lawful or unlawful, that E2open determines to be harmful to its Subscribers, operations, reputation, goodwill, or customer relations;
- to engage in illegal activities of any kind including, but not limited to, advertising, transmitting, or otherwise making available Ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software;
- to resell the software and services, in whole or in part, to any third party without E2open’s prior written consent;
When E2open becomes aware of harmful activities, however, it may take any action to stop the harmful activity as permitted in accordance with the Master Services Agreement between the parties, which may include but not be limited to, removing information, shutting down a HUB, implementing screening software designed to block offending transmissions, denying access to the Internet, taking a server off-line, or taking any other permissible action E2open deems appropriate.
E2open may disclose information, including but not limited to, information concerning a user or subscriber, a transmission made using our network or using an internet service such as a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request in accordance with the Master Services Agreement between the parties. E2open may disclose user or subscriber information or information transmitted over its network where necessary to protect E2open and others from harm, or where such disclosure is necessary to the proper operation of the system in accordance with the Master Services Agreement between the parties.
This Acceptable Use Policy was last updated on November 30, 2017.