-
Probe, scan, or test the vulnerability of any system or network;
-
Breach or otherwise circumvent any security or authentication measures;
-
Access, tamper with, or use non-public areas or parts of the Services, or shared areas of the Services you haven't been invited to;
-
Interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services;
-
Access, search, or create accounts for the Services by any means other than our publicly supported interfaces (for example, "scraping" or creating accounts in bulk);
-
Knowingly provide false or deceptive feedback about your environment;
-
Send altered, deceptive or false source-identifying information, including "spoofing" or "phishing";
-
License, sell, rent, lease, assign, distribute, transmit, host, outsource, disclose or otherwise commercially exploit the Services or make the Services available to any third party unless specifically authorized to do so;
-
Release the results of any performance or functional evaluation of any of the Services to any third party without prior written approval of Imageous for each such release;
-
Publish or share materials that are unlawfully pornographic or indecent, or that contain extreme acts of violence;
-
Advocate bigotry or hatred against any person or group of people based on their race, religion, ethnicity, sex, gender identity, sexual preference, disability, or impairment;
-
Harass or abuse Imageous personnel or representatives or agents performing services on behalf of Imageous;
-
Violate the law in any way, including storing, publishing or sharing material that's fraudulent, defamatory, or misleading; or
-
Violate the privacy or infringe the rights of others.