Legal Bits

Acceptable Use Policy

Last Modified: 18 November 2019

EXECUTIVE SUMMARY

RequirementONE has an established culture of openness, trust and integrity. Alongside this culture, we are committed to protecting our customers, partners, employees, contractors and company from illegal or damaging actions by individuals, whether deliberate or accidental.

All systems that use our SaaS or Private Cloud Services, including but not limited to computer equipment, software, operating systems, storage media, mail and internet access may be impacted by this policy.

Effective security is a team effort involving the participation and support of everyone who deals with information and/or information systems. It is the responsibility of every person to understand these guidelines, and to conduct their activities accordingly.

PURPOSE

This Policy is designed to assist in protecting the Services, our Networks and infrastructure and other users of the Services from improper or illegal activity. This policy is designed to outline the acceptable use of any RequirementONE Services. These rules are in place to protect everyone.

SCOPE

All users of the Services are expected to behave in a reasonable fashion and to adhere to commonly accepted practices of the Internet community. For the most part, simply exercising good judgment and common sense while using the Services should enable You to remain within the purview of acceptable conduct as further described below.

The sections listed below are intended merely to serve as guidelines regarding appropriate and inappropriate conduct; the list is by no means exhaustive and should not be interpreted as such.

POLICY STATEMENTS

GENERAL

This Acceptable Use Policy documents acceptable practices while using RequirementONE SaaS or Private Cloud Services (the Services). By using the Services, You acknowledge that You have read, understood, and agree to abide by this policy. In addition, You acknowledge that You will be responsible for violations of this policy by third parties that have gained access to the Services through You.

SECURITY

Basic security should be set on any mobile or computing device that connects to the Services. For example:

  • The mobile or computing device should be password or pin protected.
  • Virus protection must be installed on computing devices.
UNACCEPTABLE USE

You may not attempt to gain unauthorised access to, or attempt to interfere with or compromise the normal functioning, operation, or security of the RequirementONE Services. You may not use the Services to engage in any activities that may interfere with the ability of others to access or use the Services or the Internet. You may not attempt to gain unauthorised access to the user accounts or passwords of other users.

The list below is by no means exhaustive, but attempts to provide examples of activities which fall into the category of unacceptable use:

  • Violations of copyright, trade secret, patent or other intellectual property, or similar laws or regulations
  • Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws
  • Allowing use of your account by others
  • Port scanning or security scanning
  • Executing any form of network monitoring, port scanning or security scanning
  • Interfering with or denying service (for example, denial of service attack)
  • Sending unsolicited email messages
  • Creating or forwarding "chain letters"
  • Intentionally transmitting files containing a computer virus
  • Any form of harassment
  • Copy, use, disclose or distribute any information obtained from the Services, whether directly or through third parties (such as search engines), without the consent of RequirementONE
ILLEGAL ACTS

You agree to use Our Services only for lawful purposes. Use of the Services for transmission, distribution, retrieval, or storage of any information, data, or other material in violation of any applicable law or regulation (including, where applicable any tariff or treaty) is prohibited. This includes, without limitation, the use or transmission of any data or material protected by copyright, trademark, trade secret, patent, or other intellectual property right without proper authorisation and the transmission of any material that constitutes an illegal threat, violates export control laws, or is obscene, defamatory, or otherwise unlawful.

CO-OPERATION WITH INVESTIGATIONS

You and We will cooperate with appropriate law enforcement agencies and other parties involved in investigating claims of illegal or inappropriate activity.

PRIVACY

We will store and process all personal data in accordance with the RequirementONE Privacy Policy.

MODIFICATIONS

We reserve the right to modify this Policy from time-to-time at Our sole discretion. We will post a revised copy of the Policy on our website, with an updated date.

MISUSE OF SERVICES

Any inappropriate activity or abuse of the Services (whether or not specifically listed in this Policy, may result in Us invoking Your access to the Services.

If You become aware of any violation of these Policies by any person, including third parties that have accessed the Services through it, You shall inform us without undue delay via helpdesk@requirementone.com.

POLICY COMPLIANCE

If You engage in conduct while using the Services that is in violation of these Policies or as otherwise illegal or improper, We reserve the right to invoke the provisions of the Agreement in relation to Your access to the affected element(s) of the Services.

POLICY GOVERNANCE

This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. 

 

Questions or Additional Information:

If you have questions regarding this Agreement or wish to obtain additional information, please contact us.