Usage Policy

Acceptable Use Policy

This Acceptable Use Policy covers the products, services, and technologies (collectively referred to as “Products”) provided by Flexiapps SARL as part of any ongoing agreement. Its purpose is to protect us, our clients, and the Internet community in general, against any unethical, irresponsible, and illegal activities.

Clients of Flexiapps SARL found engaging in activities prohibited by this Acceptable Use Policy may face service suspension and account termination. In extreme cases, we may be legally obligated to report such clients to the relevant authorities.

This policy was last reviewed on July 25, 2022.

Fair Use

We provide our facilities with the assumption that your usage will be “normal commercial usage,” in accordance with our pricing structure. If your usage is deemed excessive, additional charges may apply, or capacity may be restricted.

We oppose all forms of abuse, discrimination, infringement of rights, and/or any actions that harm or disadvantage any group, individual, or resource. We expect our clients and, if applicable, their users (“end users”) to also use our Products with a similar intent.

Client Responsibility

We consider our clients responsible for their actions and the actions of anyone using our Products with the client’s authorization. This responsibility also applies to anyone using our Products unauthorized due to the client’s failure to implement reasonable security measures.

By accepting our Products, clients agree to ensure compliance with this policy on behalf of anyone using the Products as end users. Complaints regarding client actions or their end users’ actions will be forwarded to the designated contact for the relevant account.

If a client, their end user, or anyone using our Products due to the client violates our Acceptable Use Policy, we reserve the right to terminate any associated Product with the offending account or the account itself, or take any corrective or preventive action we deem appropriate, without notice. To the extent permitted by law, no credit will be available for service interruptions resulting from any violation of our Acceptable Use Policy.

Prohibited Activities: Copyright Violation and Unauthorized Access

Our Products must not be used to transmit, distribute, or store any material in violation of any applicable law. This includes, but is not limited to:

Any material protected by copyright, trademark, trade secret, or any other intellectual property right used without proper authorization.
Any material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
The client is solely responsible for any material they introduce, upload, broadcast, transmit, create, or publish through or on our Products and obtaining legal authorization to use any work included in such material.

Spam and Unauthorized Messaging Activity

Our Products must not be used to send commercial or bulk unsolicited messages in violation of applicable laws and regulations in your jurisdiction (“spam”). This includes, but is not limited to, sending spam, soliciting customers from spam sent by other service providers, and collecting responses to spam sent by other service providers.

Our Products must not be used to manage unconfirmed email addresses or phone numbers (“mailing lists”). This includes, but is not limited to, subscribing email addresses or phone numbers to a mailing list without the owner’s permission and storing email addresses or phone numbers subscribed in this manner. All mailing lists managed on or hosted by our Products must be “confirmed opt-in.” Verification of the express permission of the email address or phone number owner must be available for the lifetime of the mailing list.

We prohibit the use of email lists, phone number lists, or databases purchased from third parties for spam purposes or unconfirmed mailing lists on our Products.

This spam and unauthorized messaging activity policy applies to messages sent using our Products or messages sent from any network by the client or anyone acting on behalf of the client that directly or indirectly redirects the recipient to a site hosted via our Products.

Unethical, Exploitative, and Malicious Activity

Our Products must not be used to advertise, transmit, or make available any software, program, product, or service designed to violate this Acceptable Use Policy or the Acceptable Use Policy of other service providers. This includes, but is not limited to, facilitating means of sending spam and launching network sniffing, ping, packet spoofing, flooding, mail bombing, and denial-of-service attacks.

Our Products must not be used to access an account or electronic resource when the group or individual attempting to access it does not own or is not authorized to access the resource (e.g., “hacking,” “cracking,” “phreaking,” etc.).

Our Products must not be used to deliberately or recklessly introduce viruses or malicious code into our Products and systems.

Our Products must not be used to deliberately engage in activities aimed at harassing another group or individual.

Our definition of harassment includes, but is not limited to, denial-of-service attacks, hate speech, promoting racial or ethnic intolerance, and any activity aimed at threatening, abusing, infringing upon the rights of, or discriminating against any group or individual.

Other activities considered unethical, exploitative, and malicious include:

Obtaining (or attempting to obtain) services from us to avoid payment.
Using our facilities to obtain (or attempt to obtain) services from another provider to avoid payment.
Unauthorized access, modification, or destruction (or any attempt at that) of any information about our clients or end users, by any means or device.
Using our facilities to disrupt the use of our facilities and network by other clients or authorized individuals.
Publishing or transmitting any content or link encouraging violence, depicting a violent act, showing child pornography, or threatening the health and safety of anyone.
Any act or omission in violation of consumer protection laws and regulations.
Any violation of a person’s privacy.
Our Products may not be used by any person or entity involved or suspected of involvement in activities or causes related to illegal gambling; terrorism; drug trafficking; arms trafficking or proliferation, development, design, manufacture, production, storage, or use of nuclear, chemical, or biological weapons, weapons of mass destruction, or missiles; in each case, including any affiliation with other individuals supporting such activities or causes.

Unauthorized Use of Flexiapps SARL Property

We prohibit the impersonation of Flexiapps SARL’s identity, representing a significant business relationship with Flexiapps SARL, or ownership of any Flexiapps SARL property (including our Products and brand) for the purpose of fraudulently gaining service, clientele, patronage, or user trust.

About This Policy

This policy outlines a non-exhaustive list of activities and intentions that we deem unacceptable and incompatible with our brand.

We reserve the right to modify this policy at any time by posting the revised version on our website. The revised version will be effective from the earliest of the following dates:

The date the client uses our Products after we have posted the revised version on our website.
30 days after we have posted the revised version on our website.