Last Updated: Wednesday, December 15, 2021

StarTree Cloud Acceptable Use Policy

At StarTree, we value our customers and wish to offer them the ability to use and enjoy the network and services provided by StarTree (the “Service”) in the ways that help them most in their business. However, to help us offer you the best service we can, we need to set some rules that everyone will follow. These policies are intended to make the Service available to all our customers as consistently and efficiently as possible. These policies are part of your terms of service agreement, and violating them means we can take appropriate action to restrict or terminate your access to the Service.

Your users. You are responsible for any activity of users whom you authorize to use Service.

  • No Illegal Activity. You may access and use the Service for lawful purposes only. Your users must not engage in any of the following, whether or not lawful:
  • Hacking. Attempting to circumvent security measures or gain unauthorized access to the Service or any other online service, or to test the vulnerability of the Service.
  • Espionage. Intercepting or attempting to gain unauthorized access to information of others using the Service.
  • Malware. Introducing malware or computer viruses into any system.
  • Phishing. Attempting to gain confidential or personal information for fraudulent or improper purposes.
  • Obscenity. Providing materials that are obscene or pornographic.
  • Export Violations. Providing material or information in violation of the US export laws.
  • Infringement of intellectual property rights, such as copyright, trademark, patent, or trade secret.

Other Unauthorized Uses. Your users must not engage in any of the following:

  • Monitoring. Monitoring any data, information, or communications on any network or system other than your own.
  • Benchmarking.Performing benchmarking test or other evaluations.
  • Interference. Attempting to interfere with service to any user, host or network including, without limitation, denial-of-service attacks, mail bombing, news bombing, other flooding techniques, deliberate attempts to overload a system, or broadcast attacks.
  • Spoofing. Using, selling, or distributing in conjunction with the Services, any computer program designed to conceal the source or routing information of electronic mail messages in a manner that falsifies an Internet domain, header information, date or time stamp,
  • Spamming. Sending unsolicited commercial e-mail messages or chain mail. Company may, in its sole discretion, rely upon information obtained from anti-spamming organizations as evidence that a user is engaging in spamming.
  • Disruption. Any activity that is intended to disrupt the operation of the service or its performance.

Your Content. If the Service provides you access to discussion groups or functionality to post content such as comments, ratings, photographs, video, or audio, you must adhere to the following:

  • No Offensive Materials. You must not disseminate or post material that is unlawful, libelous, defamatory, obscene, indecent, explicit, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory or otherwise objectionable.
  • Off Topic. All postings to discussion groups must comply with that group’s charter and other policies, and not be cross-posted.

Our Discretion. We may also consider activity not listed above to be in violation of this policy, if it disrupts or is intended to disrupt the performance of hte Service or degrade the quality of the Service for any user.

Our Actions. In addition to rights we may have under our service agreement with you, such as termination of your access or account, we may do any of the following:

  • Monitor your use to investigate suspected violations of this AUP.
  • Take down or block access to user generated content.
  • Cooperate with law enforcement authorities regarding suspected unlawful activity using the System, including disclosing the identity of the user we determine is responsible for the wrongdoing. In instances involving child pornography, we will have the right to provide notice to the National Center for the Missing and Exploited Children or other designated agencies.
  • Respond to subpoenas issued to us.
  • Contact users directly regarding violations of this AUP.

If we contact you regarding a violation of this AUP, you must investigate the violation and comply with us in every reasonable way to verify any violation and take steps to stop and prevent it. We are not obligated to contact you before taking additional action, if the violation is, in our judgment, likely to cause harm to the Service or other users.