Acceptable Use2024-07-09T17:20:18+10:00

Acceptable Use Policy

Your ability to utilise Xrev® Offerings, encompassing Software, Cloud Services, and Benefits, is subject to your adherence to the regulations outlined in this Acceptable Use Policy, which Xrev® may periodically update. Terms in uppercase not explicitly defined below shall be interpreted as outlined in the General Terms.

You hereby commit not to:

  1. Transmit any information or material that is or may be:
    • False, libelous, defamatory, fraudulent, or otherwise unlawful or tortious;
    • Threatening, abusive, harassing, degrading, hateful, or intimidating, or that disrespects the rights and dignity of others;
    • Obscene, indecent, pornographic, or otherwise objectionable;
    • Related to minors or harmful to minors in any way;
    • Protected by copyright, trademark, design rights, trade secret rights, right of publicity or privacy, or any other proprietary right without express prior written consent;
    • A national or state secret, classified information, controlled unclassified information, export controlled information, or any other confidential material;
    • Secret codes, countersigns, crypto-currency, passwords, or similar information;
    • Advertising, spam, an offer to sell or buy any goods or services, a “chain letter” or any other form of solicitation; or
    • Any malware or other computer code intended to be harmful or invasive.
  2. Remove any copyright, trademark, confidentiality, or other proprietary rights notice from any Offering, Documentation, or related material.
  3. Remove, disable, or limit the effectiveness of any technical protections employed by Xrev® to manage, monitor, control, or analyse the installation of, access to, or use of any Offering or to protect Xrev®’s intellectual property rights.
  4. Use any Offerings in a fraudulent or otherwise unlawful manner or for any unlawful purpose.
  5. Impersonate any person or entity, or falsely state or misrepresent your affiliation with any person or entity in connection with the use of any Offerings.
  6. Utilise any Offerings to promote or provide instructional information about illegal activities, promote physical harm or injury, or promote any act of cruelty.
  7. Use any Offerings in connection with any inherently dangerous application or activity.
  8. Employ any Offering or related Output in connection with the training of any machine learning or artificial intelligence algorithm, software, or system.
  9. Attempt to probe, scan, or test the vulnerability of any Offering or breach any security or authentication measures.
  10. Interfere with or disrupt the operation of any Offering or the servers or networks used to make it available, including by hacking or defacing any portion of an Offering.
  11. Use any Offerings for “remote loading” or as a “door” or “signpost” to other web pages or internet resources.
  12. Collect content or information from or with an Offering using automated means.
  13. Collect or store personal data from or with an Offering without the requisite rights.
  14. Unbundle the component parts of any Offering for separate use.
  15. Use or access Software made available as part of a Cloud Service separately from the applicable Cloud Service.
  16. Intentionally or unintentionally violate any applicable laws or regulations, including export control laws.
  17. Violate the General Terms or any applicable order form or End User License Agreement.

Document control and project collaboration made simple.

Go to Top