CONSTELLATIONS INSIGHT LLC

TECHNOLOGY AND LICENSING AGREEMENT

ACCEPTABLE USE POILCY

Please Note: By clicking the “Accept” button below, you are agreeing to abide by all terms of the policy outlined as follows.  If you have already read, understand and accept these terms of the Acceptable Use Policy, then click on the button below to begin use of the System.

  1. Acceptable use of Services

1.1 This Acceptable Use Policy (“AUP”) describes how you must use and what you cannot do while using the System (“Services”). 

1.2 You are solely responsible for the data that you submit through the System.

1.3 This AUP applies to all uses of the Services including use resulting from or involving the data you submit.

1.4 You will comply with all applicable laws and regulations when using the Services and will not allow any illegal or improper use of the Services. 

1.5 Proprietary information stored on the System remains the sole property of Constellations Insight LLC (CON).

  1. Changes to AUP

2.1 We may change this AUP from time to time by posting the updated version of this AUP to the System’s URL or otherwise providing notice to you.  If you do not agree with the change, you must stop using the Services.  If you continue to use the Services following a change to this AUP you will be deemed to have accepted the change.

  1. AUP applies to all Users

3.1 This AUP applies to the use of the Services by all users, customers, third party service providers and other end-users (“Users”).  You are responsible for the acts and omissions of all Users that you provide with access to the System.

  1. Limitations

4.1 You may not avoid any limitations we place on your use of the Services.

  1. Abuse and Illegal Behavior

5.1 You may not use the Services:

  • to conduct or engage in any illegal business or activity;

  • to collect, copy or process information in a way that breaches data protection laws or leads to a wrongful breach of privacy; or

  • to create, distribute, process or view any: (i) defamatory; (ii) obscene, indecent or pornographic; (ii) racist, sexist or otherwise discriminatory; (iv) misleading, deceptive or fraudulent; or (v) otherwise objectionable, offensive or illegal material; or

  • for any other purpose other than its intended use.

  1. Access Use and Control

  • Individuals (Users) shall not:

  • allow anyone else to use their user ID and password on the System;

  • leave user accounts logged in at an unattended and unlocked computer;

  • use someone else’s user ID and password to access the System;

  • leave their password unprotected (for example writing it down);

  • perform any unauthorized changes to the System;

  • attempt to access data that they are not authorized to use or access;

  • exceed the limits of their authorization or specific business need to interrogate the System or data;

  • connect any non-authorized device to the network or System;

  • store data on any non-authorized equipment;

  • give or transfer data or software to any unauthorized person or organization without prior written authorization;

  • in any way infringe any copyright, database rights, trademarks or other intellectual property;

  • introduce malicious programs (e.g., viruses, worms, Trojan horses, e-mail bombs, ‘pirated’ software, etc.) or any other software product not appropriately licensed for use by CON;

  • access data, a server or an account for any purpose other than conducting authorized services, even if you have authorized access;

  • circumvent user authentication or security of any host, network or account; or

  • provide information about, or lists of, users to unauthorized parties.

  • You have the responsibility to promptly report the theft, loss or unauthorized disclosure of the System proprietary information.
  • You will notify us within one business day of any user access that requires termination.

  • Access to the System is controlled by the use of User IDs and passwords. All User IDs and passwords are to be uniquely assigned to named individuals and consequently, individuals are accountable for all activity associated with their logon while on the System.

  • System level and user level passwords must comply with the System Password Policy. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited. 

  • You may access, use or share the System proprietary information only to the extent it is authorized and necessary.

  1. General Use and Ownership

7.1 We reserve the right at any time and without prior notice, to audit any or all activity and data.

7.2 We may restrict access to any data you submit via the System, or remove it from the Services if we have reasonable grounds to suspect that it breaches this AUP.

7.3 We may be required to cooperate with courts and judicial bodies, police and law enforcement authorities, regulators and other appropriate third parties to help with the investigation and prosecution of illegal conduct.  This cooperation may include disclosing information and data about the Services to them and providing them with information about your use of the Services and your client content when we are legally required to do so.

  1. Suspension or Termination

8.1 If you breach this AUP or misuse the Services or allow others to do so, we may suspend or terminate your use of the Services.

8.2 If we decide that the breach can be remedied without suspending your access to the Services, we will request you to remedy the breach within the time period that we specify.  If the breach is not remedied within that time period, we reserve the right to suspend your access to the Service.

8.3 If we suspend your access to the Service we may terminate your access if you do not correct the reason for suspension within seven days of the suspension.

  1. Reporting Breaches

9.1 You will immediately notify us if you become aware of any breach of this AUP and assist us to investigate or remedy the breach.

  1. CON’s Confidential Information policy also applies to all Users.