Acceptable Use Policy

This Acceptable Use Policy (this “Policy”) describes prohibited uses of the security vulnerabilities search engine, database and assessment platform as well as other services (the “Service”) offered by Vulners, Inc. (“Vulners”) and the related website located at https://www.vulners.com (the “Site”). This policy supplements, and is incorporated into, Vulners’s Subscription Agreement (currently published at https://www.vulners.com/static/docs/subscription_agreement.html) (the “Subscription Agreement”), and the Terms of Use for the Site (currently published at https://www.vulners.com/static/docs/terms_of_use.html) (the “Terms of Use”). If any provision in this Policy conflicts with a term in the Subscription Agreement or the Terms of Use, then the applicable provisions of Subscription Agreement and the Terms of Use will prevail unless the term in this Policy specifically states that it will prevail.

If you violate this Policy, Vulners may suspend or terminate your use of the Service or access to the Site. Vulners’s right to suspend or terminate your use of the Service or Site applies even if a breach is committed unintentionally or without your authorization if Vulners believes that suspension or termination is necessary to ensure compliance with laws or to protect the rights, safety, privacy, security or property of Vulners, its customers or third parties.

Vulners may modify this Policy at any time by posting a revised version on the Site. By using the Service or accessing the Site, you agree to the latest version of this Policy.

Intellectual Property

You may not use the Service or Site in any manner that would result in an infringement, dilution, misappropriation or other violation any intellectual property or proprietary rights of others, including but not limited to copyrights and rights arising from patents, trademarks and trade secrets. You may not use the Service or Site in breach of any terms and conditions of any third-party terms of use or any other contractual policy applicable to such third-party service or site.

No Framing or Scraping

You may not frame or mirror the Site without Vulners’s express prior written consent. You may not use any robot, spider, site search/retrieval application or other manual or automatic device to retrieve, index, “scrape,” “data mine,” or in any way gather any messages, text, files, images, photos, video, sounds, profiles, works of authorship, or any other content from the Service or Site or reproduce or circumvent the navigational structure or presentation of the Service or Site without Vulners’s express prior written consent. Notwithstanding the foregoing, Vulners grants to the operators of public search engines the permission to use spiders to copy material from the Site for the sole purpose of, and solely to the extent necessary for, creating publicly available searchable indices of such material, but not caches or archives of such material. Vulners reserves the right to revoke these exceptions either generally or in specific cases.

Email and Unsolicited Messages

You may not use the Service or Site to transmit unsolicited email or other messages, including without limitation unsolicited bulk email (“spam”), or email or messages that are excessive and/or intended to harass or annoy others. You may not continue to send email or other messages to a recipient who has indicated that he/she does not wish to receive them. You may not alter or obscure email or message headers or assume a sender’s identity (including without limitation by engaging “spoofing”, “phishing” or similar attacks) without the sender’s explicit permission.

System Security

You may not use the Service or Site to violate the security or integrity of any network, computer or communications system, software application or computing device (each, a “System”), including without limitation by attempting to: (a) probe, scan or test the vulnerability of a System or breach or circumvent security or authentication measures without authorization; (b) make network connections to, or otherwise access, a System without authorization; (c) monitor data or traffic on a System without authorization; (d) tamper, reverse-engineer, hack, interfere with, disrupt or disable a System, including without limitation by means of overloading, “flooding,” “mailbombing,” “crashing,” or denial of service attacks; (e) forge any TCP/IP packet header or any part of the header information in any e-mail or newsgroup posting; (f) use another party’s account name or persona without authorization; or (g) take any action in order to obtain a Service to which you are not entitled.

Privacy

You may not use the Service or Site to violate the privacy or confidentiality of others, including by transmitting, storing, displaying, distributing or otherwise making available others’ private or confidential information (including without limitation their account names or personal data associated with their Service or Site account) without authorization.

Compliance with Laws

Without limiting the foregoing prohibitions, you may not use the Service or Site for any illegal purpose or in violation of any laws (including without limitation data, privacy, consumer protection, and export control laws).

No High-Risk Use

You may not use the Service in any situation where failure or fault of the Service could lead to death or serious bodily injury of any person, or to physical or environmental damage. For example, you may not use, or permit any other person to use, the Service in connection with aircraft or other modes of human mass transportation or nuclear or chemical facilities.

Responsibility for End Users

You are responsible for violations of this Policy by anyone using the Service or Site with your permission or using your account on an unauthorized basis. Your use of the Service or Site to assist another person in an activity that would violate this Policy if performed by you is a violation of this Policy. This Policy applies to anyone accessing or using the Service or the Site; however, each prohibition included in this Policy shall be interpreted to include, and apply to, any action directly or indirectly taken, authorized, facilitated, promoted, encouraged or permitted by a user of the Service or Site, even if such person did not themselves violate the prohibition.

Monitoring and Enforcement

Vulners reserves the right, but does not assume the obligation, to investigate any violation of this Policy or misuse of the Service or Site. Vulners has the right in its sole discretion to edit, refuse to post or remove any material submitted to or posted on the Service or the Site that Vulners finds to be in violation of this Policy. Vulners may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Such reporting may include disclosing appropriate customer data. Vulners also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.

Reporting Violations

If you become aware of any violation of this Policy, you must immediately notify Vulners by email at [email protected] and provide Vulners with assistance, as requested, to stop or remedy the violation.