Acceptable Use Policy

This Acceptable Use Policy (“AUP”) describes the terms under which any user or users (the “Customer”) of the Products and Services agree to be bound by during their use of those Products and Services. The Customer acknowledges and agrees to be bound by all the terms, conditions, and policies of the AUP, as set forth herein. The Customer acknowledges and agrees that it is responsible for continual compliance of this policy, in order to ensure the integrity, security and reliability of Products, Services and the Suppliers networks, systems, facilities and data.

Spam

The Customer may not send, or attempt to send, unsolicited email messages (“Spam”). Spam is not only annoying to recipients; it violates many laws, seriously affects the efficiency and cost-effectiveness of Supplier Services, and moreover undermines the environment for communications Vuelio wishes to foster.

Sending Spam can lead to industry blacklisting of the Customer’s and/or the Supplier’s business and servers, resulting in interruption and/or termination of a Customer’s subscription.

Specifically, the Customer agrees not to:

1. Send, or attempt to send, Spam of any kind from within the Supplier’s products, services or network;

2. Send email messages which result in complaints from the recipient or from the recipient’s email provider, or which result in blacklisting of the sender’s email address or mail server;

3. Send email messages which are excessive and/or intended to harass or annoy others;

4. Continue to send email to a recipient that has indicated that he/she does not wish to receive it; or

5. Take any actions intended to cloak the Customer’s identity or contact information, including but not limited to intentionally omitting, deleting, forging or misrepresenting message headers or return addresses.

In the absence of positive, verifiable proof to the contrary, the Supplier considers complaints by recipients of emails to be de-facto proof that the recipient did not either subscribe or otherwise request the email(s) about which a complaint was generated, or share a legitimate interest that would constitute a legal basis for email distribution in compliance with the GDPR.

Security

The Customer is prohibited from violating, or attempting to violate, the security of the Supplier’s application network. Any violations may result in criminal and civil liabilities to the Customer. The Supplier will investigate any alleged violations and will cooperate with law enforcement agencies if a criminal violation is suspected.

Examples of violations of the security of the Supplier’s application network include, but are not limited to: (i) accessing data not intended for the Customer, (ii) logging into a server or account which the Customer is not authorised to access, (iii) attempting to probe, scan or test the vulnerability of a system, (iv) breach of security or authentication measures, (v) attempting to interfere with service to any user, host or network, or (vi) taking any action in order to obtain services to which the Customer is not entitled.

Illegal Use

The Supplier’s products, services and network may only be used for lawful purposes. For example, the Customers may not use the Supplier’s products, services and network to create, transmit, distribute, or store content that: (i) violates a trademark, service mark, copyright, trade secret or other intellectual property rights of others, (ii) violates export control laws or regulations, (iii) violates the privacy, publicity or other personal rights of others, (iv) impairs the privacy of communications, (v) contains obscene, offensive, unlawful, defamatory, harassing, abusive, fraudulent, or otherwise objectionable content as reasonably determined by the Supplier, (vi) encourages conduct that would constitute a criminal offence or give rise to civil liability, (vii) constitutes deceptive marketing, (viii) violates reasonable regulations of the Supplier or other service providers, (ix) causes technical disturbances to the Supplier’s products, services and network, or violates the policies of such networks, including, but not limited to, intentional introduction of any viruses, Trojan horses, worms, time bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data, or (x) assists, encourages or permits any persons in engaging in any of the activities described in this section. If the Customer becomes aware of any such activities, the Customer is obligated to immediately notify the Supplier and take all other appropriate actions to cause such activities to cease.

Content

The Customer is responsible for all content that is transmitted, received and stored by the Supplier through the Customer’s use of the Supplier’s products and services. The Supplier takes no responsibility for content passing through or stored on the Supplier’s hosted servers, including but not limited to, viruses, mail floods or other disabling features, or content provided on third party websites that are linked to by content passing through or stored on the Supplier’s products, services and network. The Supplier does not adopt, nor warrant the accuracy of, the content of any linked Web site and undertakes no responsibility to update the content.

Consequences of Unacceptable Use

The Supplier reserves the right to suspend or terminate Customer’s access to the Supplier’s products, services and network immediately, and without notice, if the Supplier determines the Customer is in violation of this policy. Indirect or attempted violations of this policy, and actual or attempted violations by a third party on behalf of the Customer shall be considered violations of this policy by the Customer.