Laserfiche WebLink
Acceptable User Policy (Ver. i — 111 S.1) OO Entech Solution, LLC. 2018 <br />Confidential <br />Acceptable Use Policy <br />This Acceptable Use Policy applies to all persons and entities (collectively, "customers") using <br />the products and services of Entech Solutions LLC., ("Entech") including Internet service. The <br />policy is designed to protect the security, integrity, reliability, and privacy of both the Entech <br />network and the products and services Entech offers to its customers. Entech reserves the right <br />to modify this policy at any time, effective immediately upon posting of the modification. Your <br />use of Entech's products and services constitutes your acceptance of the Acceptable Use Policy <br />in effect at the time of your use. You are solely responsible for any and all acts and omissions <br />that occur during or relating to your use of the service, and you agree not to engage in any <br />unacceptable use of the service. <br />What Uses are Prohibited? <br />Unacceptable use includes, but is not limited to, any of the following: <br />1. Posting, transmission, re -transmission, or storing material on or through any of Entech's <br />products or services, if in the sole judgment of Entech such posting, transmission, re- <br />transmission or storage is. (a) in violation of any local, state, federal, or non -United States law <br />or regulation (including rights protected by copyright, trade secret, patent or other intellectual <br />property or similar laws or regulations); (b) threatening or abusive; (c) obscene; (d) indecent; <br />or (e) defamatory. Each customer shall be responsible for determining what laws or regulations <br />are applicable to his or her use of the products and services. <br />2. Installation or distribution of "pirated" or other software products that are not appropriately <br />licensed for use by customer. <br />3. Resale of Entech's products and services without the express prior written consent of Entech <br />(unless you are an authorized wholesaler). <br />4. Deceptive marketing practices. <br />5. Actions that restrict or inhibit anyone - whether a customer of Entech or otherwise - in his <br />or her use or enjoyment of Entech's products and services, or that generate excessive network <br />traffic through the use of automated or manual routines that are not related to ordinary <br />personal or business use of Internet services. <br />6. Introduction of malicious programs into the Entech network or servers or other products and <br />services of Entech (e.g., viruses, trojan horses and worms). <br />7. Causing or attempting to cause security breaches or disruptions of Internet communications. <br />Examples of security breaches include but are not limited to accessing data of which the <br />customer is not an intended recipient, or logging into a server or account that the customer is <br />