Acceptable Use Policy
Effective starting: September 14, 2022
FW-Money is committed to helping you improve greatly in your work and grow. Our products and services must run smoothly, quickly, and without distractions. Our users need to help us to do this, so it’s imperative not to misuse or abuse our products and services. Please use your common sense and see below our Acceptable Use Policy for details.
Acceptable Use Policy
Effective starting: September 14th, 2022
This Acceptable Use Policy (“AUP”) describes rules that apply to any party (“you”, “your”, “yours”, “Subscriber” or “Customer”) using any products and services (“Services”) provided by FW-IT Limited and any user of any software application or service made available by Customer that interfaces with the Services (“End User”).
The prohibited conduct in this AUP is not exhaustive. Customer is responsible for its End Users’ compliance with this AUP. If Customer or any End User violates this AUP, FW-IT may suspend Customer’s use of the Services.
This AUP may be updated by FW-IT from time to time, which may be provided via Customer’s account, e-mail, or by posting an updated version of this AUP at https://www.fw-it.com/acceptable-use-policy/
No Inappropriate Content or Users
Do not use the Services to transmit or store any content or communications (commercial or otherwise) that is illegal, harmful, unwanted, inappropriate, or objectionable, including, but not limited to, content or communications which FW-IT determines (a) is false or inaccurate; (b) is hateful or encourages hatred or violence against individuals or groups; or (c) could endanger public safety. This prohibition includes use of the Services by a hate group. Customer and its End Users are also prohibited from using the Services to promote, or enable the transmission of or access to, any prohibited content or communications described in this paragraph.
Prohibited Activities
Do not use the Services to engage in or encourage any activity that is illegal, deceptive, harmful, a violation of others’ rights, or harmful to FW-IT business operations or reputation, including:
- Violations of Laws. Violating laws, regulations, governmental orders, or industry standards or guidance in any applicable jurisdiction (collectively, “Applicable Laws”). This includes violating Applicable Laws requiring (a) consent be obtained prior to transmitting, recording, collecting, or monitoring data or communications or (b) compliance with opt-out requests for any data or communications.
- Interference with the Services. Interfering with or otherwise negatively impacting any aspect of the Services or any third-party networks that are linked to the Services.
- Reverse Engineering. Tampering with, reverse-engineering, or hacking our Services, circumventing any security or authentication measures, or attempting to gain unauthorised access to the services, related systems, networks, or data modifying, disabling, or compromising the integrity or performance of the services or related systems, network or data deciphering any transmissions to or from the servers running the Services.
- Falsification of Identity or Origin. Creating a false identity or any attempt to mislead others as to the identity of the sender or the origin of any data or communications.
- No Service Integrity Violations. Do not violate the integrity of the Services, including:
- Bypassing Service Limitations. Attempting to bypass, exploit, defeat, or disable limitations or restrictions placed on the Services. Going far beyond the use parameters for which the service was intended.
- Security Vulnerabilities. Finding security vulnerabilities to exploit the Services or attempting to bypass any security mechanism or filtering capabilities.
- Disabling the Services. Any denial of service (DoS) attack on the Services or any other conduct that attempts to disrupt, disable, or overload the Services.
- Harmful Code or Bots. Transmitting code, files, scripts, agents, or programs intended to do harm, including viruses or malware, or using automated means, such as bots, to gain access to or use the Services.
- Unauthorised Access. Attempting to gain unauthorised access to the Services.
- Storage. Consuming an unreasonable amount of storage in a way that’s unrelated to the purposes for which the services were designed
Data Safeguards
Customer is responsible for determining whether the Services offer appropriate safeguards for Customer’s use of the Services, including, but not limited to, any safeguards required by Applicable Laws, prior to transmitting or processing, or prior to permitting End Users to transmit or process, any data or communications via the Services.
Service and Country Specific Requirements
Additional requirements for specific Services, including any country specific requirements that are set forth and applied solely to the extent Customer uses to comply with such requirements.
Violations of this AUP
Violations to any part of this AUP including any prohibited activities, content or communications, may be reported to security@fw-it.com.
Customer agrees to immediately report any violation of this AUP to FW-IT and provide cooperation, as requested by FW-IT to investigate and/or remedy that violation.
Feedback on this Policy
Please also feel free to contact us if you have any questions about FW-IT’s acceptable use policy. You may contact us at feedback@fw-it.com or at our postal address below:
FW-IT Limited
86 – 90 Paul Street,
London, United Kingdom
EC2A 4NE
Date of Last Revision: Jan 26th, 2018