Usage policy

This Use Policy describes the rules that apply to any party (“Customer”) using products and services (“Services”) provided by Dillo and any user of any software application or service made available by Customer that interfaces with the Dillo Services (“End User”). Customer is responsible for its End Users’ compliance with this End User Policy (“UP” or “Use Policy”). If Customer or any End User violates this Use Policy, Dillo may suspend Customer’s use of the Services. This Use Policy may be updated by Dillo from time to time upon reasonable notice, which may be provided through the Customer’s account, email, or by posting an updated version of this UP on https://www.dillo.cloud/politica-di-utilizzo/.

 

No inappropriate content or users.

Do not use the Services to transmit or store content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, objectionable, confirmed as criminal misinformation, or otherwise poses a threat to the public. This prohibition includes use of the Services by hate groups or content that incites exploitation and abuse.

 

Prohibited Activities.
Do not use the Services to engage in or encourage activities that are illegal, deceptive, harmful, violate the rights of others, or harm Dillo’s business operations or reputation, including:

 

  • Violation of laws, regulations, governmental orders or industry standards or guidelines in any applicable jurisdiction (collectively, “Applicable Laws”). This includes violation of applicable laws that require:

  (a) obtaining prior consent for the transmission, recording, collection or monitoring of communications or data

  (b) compliance with waiver requests for any data or communications.

Interfere with or otherwise adversely affect any aspect of the services offered by Dillo or third party networks connected to the Services.

  • Reverse engineering, copying, disassembling or decompiling the Services.
  • Falsification of identity or origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of data or communications.
  • No violation of the integrity of the Services. No violation of the integrity of the Services, including:

 

  • Bypassing Service Restrictions. Attempting to circumvent, exploit, override or disable limitations or restrictions imposed on the Services.
  • Security Vulnerabilities. Detection of security vulnerabilities to exploit the Services or attempt to circumvent any security mechanisms or filtering capabilities.
  • Disabling the Services. Any Denial of Service (DoS) attack on the Services or any other conduct that attempts to disrupt, disable or overburden the Services.
  • Malicious Code or Bots. Transmit code, files, scripts, agents or programs intended to cause harm, including viruses or malware, or use automated means, such as bots, to access or use the Services.
  • Unauthorised Access. Attempt to gain unauthorised access to the Services.

 

Data Protection.
The Customer is responsible for determining whether the Services provide adequate safeguards for the Customer’s use of the Services, including, but not limited to, any safeguards required by Applicable Laws, prior to transmitting or processing, or prior to allowing End Users to transmit or process, any data or communications through the Services.