POLÍTICA DE USO ACEPTABLE
INTRODUCCIÓN
1.1 This Acceptable Use Policy (as updated from time to time) is incorporated into our Agreement pursuant to the Enterprise Client – Terms and Condition of Business. It governs how the Client, Authorised Affiliates and Authorised Users may access and use the LawLink and/or the AI Contract Review Service (Applications).
1.2 Defined terms in this Acceptable Use Policy shall have the meaning given in the Agreement and the same rules of interpretation apply. In addition, in this Acceptable Use Policy the following definitions have the meanings given below:
Virus | means any program or code which may prevent, impair, affect the reliability of, destroy, damage, interfere with, corrupt, or cause undesired effects on any program, computer, system, software, code, data or other information (including all viruses, worms, trojan horses, spyware, logic bombs and similar files, scripts, agents, things or devices). |
1.3 The Client, Authorised Affiliates and Authorised Users are only permitted to use and access the Applications for the Permitted Purpose as defined in our Agreement and in accordance with its terms. Use of the Applications (or any part) in any other way, including in contravention of any restriction on use set out in this Acceptable Use Policy, is not permitted. If any person does not agree with the terms of this Acceptable Use Policy, they may not use the Applications, and the Client is responsible for ensuring that its Authorised Users and Authorised Affiliates are aware of this.
2 RESTRICTIONS ON USE
2.1 As a condition of use of the Applications, the Client shall not use the Applications and shall ensure that no Authorised User, Authorised Affiliate or third party shall use the Applications:
2.1.1 for any purpose that is unlawful under any applicable law or prohibited by this Acceptable Use Policy or our Agreement;
2.1.2 to commit any act of fraud;
2.1.3 to distribute any Virus;
2.1.4 for the purposes of promoting unsolicited advertising or sending spam;
2.1.5 to simulate communications from the Company or another service or entity in order to collect identity information, authentication credentials, or other information (‘phishing’);
2.1.6 in any manner that disrupts the operations, business, equipment, websites or systems of the Company or any other person or entity (including any denial of service and similar attacks);
2.1.7 in any manner that harms or may endanger minors or any other person;
2.1.8 in connection with any service, use or purpose where the failure of the Application (or any part) may endanger the health or life of any person or cause damage or loss to any tangible property or the environment;
2.1.9 to promote any unlawful activity;
2.1.10 to represent or suggest that the Company endorses any other business, product or service unless the Company has separately agreed to do so in writing;
2.1.11 to gain unauthorised access to or use of any computers, data, systems, accounts or networks of any person;
2.1.12 in any manner which may impair any other person’s use of the Applications or use of any other services provided by the Company to any other person;
2.1.13 to attempt to circumvent any security controls, system instructions, in-built safety and security guardrails or mechanisms;
2.1.14 to attempt to circumvent any password or user authentication methods of any person;
2.1.15 in any manner inconsistent with our Agreement, the relevant user manual or any instructions provided by the Company from time to time; or
2.1.16 in any manner which does not comply with the provisions relating to Intellectual Property Rights and Confidential Information contained in our Agreement, including, without restriction, inputting any information of a confidential or proprietary nature derived from or relating to the Applications in any generative AI solution (including but not limited to ChatGPT, Google Gemini or Microsoft Copilot) without the Company’s explicit written consent.
2.2 The Client shall not allow (and shall ensure that no Authorised User, Authorised Affiliate nor third party shall allow) any automated process or service (such as, without restriction, web crawlers, spiders and bots) to access the Applications to extract, scrape, crawl or collect data from the Applications, or for any other purpose save as expressly permitted by our Agreement.
3 CLIENT DATA AND COMMUNICATION STANDARDS
3.1 In addition to complying with the Agreement, including the Data Protection Addendum, and with all applicable laws relating to data protection, the Client shall ensure that any Client Data or communication made on or using the Applications by any person conforms to appropriate and lawful standards of accuracy, decency and lawfulness, which shall be applied in the Company’s discretion, acting reasonably. In particular, the Client warrants and undertakes that any Client Data and each such communication shall at all times be:
3.1.1 submitted lawfully and without infringement of any Intellectual Property Rights of any person;
3.1.2 free of any Virus (at the point of entering any of the Applications or Company’s systems);
3.1.3 factually accurate;
3.1.4 provided with all necessary consents of all relevant third parties;
3.1.5 not defamatory or likely to give rise to an allegation of defamation;
3.1.6 not obscene, seditious, vulgar, pornographic, sexually explicit, discriminatory or deceptive;
3.1.7 not abusive, threatening, offensive, harassing or invasive of privacy;
3.1.8 free of any content or activity that is, or may reasonably be suspected to be, terrorist in nature;
3.1.9 not racist, sexist or xenophobic or otherwise discriminatory;
3.1.10 not of a nature that any courts, regulators, law enforcement authorities or other governmental authorities may order be blocked, deleted, suspended or removed;
3.1.11 not liable to offend religious sentiments or deeply held beliefs; and
3.1.12 unlikely to cause offence, embarrassment or annoyance to any person.
4 LINKING AND OTHER INTELLECTUAL PROPERTY MATTERS
4.1 As a condition of use of the Applications, the Client agrees not to (and to ensure that the Authorised Affiliates and Authorised Users do not):
4.1.1 create a frame or any other browser or border environment around the content of the Applications (or any part);
4.1.2 display any of the trademarks or logos used on the Applications without the Company’s permission together with that of the owner of such trademarks or logos; or
4.1.3 use the Company’s or any Affiliate thereof trademarks, logos or trade names in any manner.