Acceptable Use Policy
Last modification date: April 2025
In order to provide our Users with the best possible experience when using Whoz solution, it is imperative that the Services operate smoothly, efficiently, and without any interruptions. Furthermore, Whoz is committed to protecting clients, staff, and third parties from illegal or damaging actions by individuals, either knowingly or unknowingly. To ensure this, we require assistance from Users to refrain from misusing or abusing the Services.
We define, but not limiting to, what we mean by misuse or abuse in this Acceptable Use Policy (the “Policy”) in order to allow us to identify and respond appropriately to such behaviors.
If you violate this Policy, in addition to any other remedies that may be available to us, we may suspend or terminate your use of the Services if we believe that suspension or termination is necessary to ensure compliance with laws or to protect the rights, safety, privacy, security or property of Whoz, its clients, staff or third parties.
If you become aware of any violation of this Policy, you must immediately notify us by email at compliance@whoz.com and provide us with assistance, as requested, to stop or remedy the violation.
The definition of Content herein encompasses two types of materials: (1) anything you share, post, submit, upload, or otherwise provide in any way to the Services, including but not limited to information, data, text, software, code, scripts, music, sound, photos, graphics, videos, messages, tags, and interactive features, and (2) any other materials, content, or data that you use with the Services.
The following is a list of actions that we strictly prohibit:
Wrongful activities
-
Engaging in any form of misrepresentation, including but not limited to spoofing, phishing, impersonating others, or manipulating headers or other identifiers to disguise the origin of any Content. This also includes falsely implying any sponsorship or association with Whoz or any third party.
-
Engaging in activities that invade the privacy of others, such as disclosing or sharing confidential information of other individuals without their explicit consent, or gathering personal information of other individuals (including their account names or details) from the Services.
-
Engaging in stalking, harassment, or making explicit threats of violence against others using the Services.
-
Engaging in any unlawful activity, or using the Services or its Technologies in a manner that contravenes any applicable laws or regulations (including but not limited to those related to data protection, privacy, artificial intelligence, and the control of exports).
-
Using any method other than the publicly supported interfaces (such as robot, spider, site search/retrieval application) to retrieve, index, “scrape,” “data mine,” or in any way gather any messages, text, files, images, photos, video, sounds, profiles, works of authorship, or any other content from the Services or reproduce or circumvent the navigational structure or presentation of the Services
-
Reverse engineering, decompiling, disassembling or otherwise attempting to discover the object code, source code or underlying ideas or algorithms of the Services.
- Using the access to the Services in order to: (1) build a competitive product or service, (2) make or have made a product using similar ideas, features, functions or graphics of the Service, or (3) copy any features, functions or graphics of the Services.
- Framing or mirroring the Services.
-
Modifying, translating, or creating derivative works based on or inspired after any element of the Services or Documentation.
-
Using the Services in any situation where failure or fault of the Services could lead to death or serious bodily injury of any person, or to physical or environmental damage.
-
Using the Services for any purpose or in any manner other than in accordance with the Documentation.
Inappropriate communications
-
Requesting or contacting Users for commercial purposes
-
Sending spam, advertising, chain letters, or other unsolicited Content through the Services.
-
Disparaging Whoz or its partners, vendors, or affiliates
-
Advertising or promoting other products or services without proper authorization.
Inappropriate content
Posting, uploading, sharing, submitting, distributing, or providing Content on the Services that violates any of the following terms is prohibited:
-
Infringes, dilutes, misappropriates or other violates any intellectual property or other rights of Whoz or any third party, including but not limited to copyright, trademark, patent, trade secret, moral rights, privacy rights, publicity rights, or any other intellectual property or proprietary right or contractual right.
-
You do not have the right to submit.
-
Is deceptive, fraudulent, illegal, obscene, defamatory, libelous, threatening, harmful to minors, pornographic, indecent, harassing, hateful, or otherwise inappropriate.
-
Encourages or furthers conduct that would violate any applicable laws, including any criminal laws, or any third-party rights, including publicity or privacy rights.
-
Attacks or advocates discrimination against individuals or groups based on their race, ethnicity, national origin, religion, sex, gender, sexual orientation, disability, or medical condition.
-
Contains malicious code such as viruses, bots, worms, Trojan horses, scripting exploits, time bombs or other similar materials.
-
Could cause damage to Whoz or any third party in any way.
Disruption
-
Compromising the integrity of the systems, which includes any attempts to probe, scan, or test the vulnerability of any system or network that hosts the Services. However, this does not apply to any security assessments that are expressly permitted by Whoz.
-
Tampering with, reverse-engineer, or hack the Services, bypass security or authentication measures, or try to gain unauthorized access to the Services, related systems, networks, or data.
-
Modifying, disabling, or compromising the integrity or performance of the Services or any related systems, network, or data.
-
Intercepting or decoding any transmissions to or from the servers that run the Services
-
Overwhelming the infrastructure by imposing an unreasonably large load on the systems that consume extraordinary resources such as CPUs, memory, disk space, bandwidth, etc. Examples of this include, but are not limited to:
-
Using automated systems such as robots or other means to send more request messages to the servers than a human could reasonably send in the same period of time by using a normal browser,
-
Using our APIs in a manner that would negatively impact our services or infrastructure, or that would cause harm or disruption to our Users,
-
Consuming an unreasonable amount of storage for music, videos, pictures, or any other Content that is unrelated to the purposes for which the Services were designed.
We reserve the right, but does not assume the obligation, to investigate any violation of this Policy or misuse of the Services. We may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Such reporting may include disclosing appropriate customer data. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.
Comments
0 comments
Article is closed for comments.