Logo

Updated October 5, 2024

Acceptable Use Policy

This BizLia.com Acceptable Use Policy (this 'Policy') describes prohibited uses of the cloud-based services offered by BizLia, Inc. (the 'SaaS Products') to you. The examples described in this Policy are not exhaustive. BizLia.com may modify this Policy at any time with an updated version. By accessing or using the SaaS Products, you agree to the latest version of this Policy. If you violate the Policy or authorize or help others do so, BizLia.com may suspend or terminate your use of the SaaS Products.


No Illegal, Harmful, or Offensive Use or Content

You may not access, use, or authorize, encourage, promote, facilitate, or help others to use the SaaS Products for any illegal, harmful, fraudulent, infringing, or offensive use, or to transmit, store, display, distribute, or otherwise make available content that is illegal, harmful, fraudulent, infringing, or objectionable. Prohibited activities or content include engaging in illegal activities that violate the rights of others or that can cause harm to others, as well as activities that can harm Bizlia.com's operations or reputation. You must not transmit, store, display, distribute, or make available content that infringes or misappropriates the intellectual property or proprietary rights of others. Additionally, content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable is strictly prohibited. You must not use the SaaS Products to deploy computer technology that can damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including but not limited to viruses, Trojan horses, worms, time bombs, spyware, or cancelbots.


No Security Violations

You are prohibited from using the SaaS Products to violate the security or integrity of any network, computer, or communications system, software application, or network or computing device (referred to as "System"). This includes activities such as unauthorized access or use of a System, including attempting to probe, scan, or test the vulnerability of a System or breach any security or authentication measures employed by a System. Additionally, unauthorized monitoring of data or traffic on a System is strictly prohibited. You must not engage in the forgery of TCP-IP packet headers, e-mail headers, or any part of a message that describes its origin or route. It is important to note that legitimate use of aliases and anonymous remailers is allowed and not prohibited by this provision.

No Network Abuse

You may not establish network connections to users, hosts, or networks without proper authorization. Prohibited activities include monitoring or crawling a System in a manner that impairs or disrupts the System being monitored or crawled. It is also prohibited to inundate a target with excessive communication requests, rendering the target unable to respond to legitimate traffic or causing such slow responses that it becomes ineffective. Interfering with the proper functioning of any System, including deliberate attempts to overload a system through mail bombing, news bombing, broadcast attacks, or flooding techniques, is strictly prohibited. Operating network services such as open proxies, open mail relays, or open recursive domain name servers is also not allowed. Furthermore, using manual or electronic means to circumvent use limitations placed on a System, such as access and storage restrictions, or to avoid incurring fees is prohibited.

No E-Mail or Other Message Abuse

You must not access or use the SaaS Products to distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like "spam"), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.

BizLia.com's Monitoring and Enforcement & Violations of this Policy

BizLia.com reserves the right but does not assume the obligation, to investigate any violation of this Policy or misuse of the SaaS Products. BizLia.com may investigate violations of this Policy or misuse of the SaaS Products, or remove, disable access to, or modify any content or resource that violates this Policy.

BizLia.com may report any activity that BizLia.com suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. BizLia.com's reporting may include disclosing your information or content if required by law and only in accordance with the applicable law’s requirements. BizLia.com may also cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help investigate and prosecute illegal conduct by providing network and systems information related to alleged violations of this Policy.

If you become aware of any violation of this Policy, you must immediately notify us and provide BizLia.com with assistance, as requested, to stop or remedy the violation.

YOU AGREE TO HOLD BIZLIA.COM HARMLESS FROM AND AGAINST, AND WAIVE (TO THE EXTENT PERMITTED BY APPLICABLE LAW) ANY CLAIMS YOU MAY HAVE AGAINST BIZLIA.COM RESULTING FROM ANY DISCLOSURE, INVESTIGATION, OR ACT OR OMISSION OF BIZLIA.COM IN THE COURSE OF CONDUCTING OR COOPERATING WITH AN INSPECTION AS DESCRIBED IN THIS POLICY.

Start your 30-day free trial

Join over 4,000+ startups already growing with Untitled.