top of page

IPDC SOLUTIONS PTE LTD ("IPDC”) ACCEPTABLE USE POLICY (“Policy”)

 

This Policy is made between IPDC and Subscriber(s) procuring IPDC’s services by an individual or by a legal person authorized by Subscriber(s) whose name and signature as ascribed or by a inserting (√) as symbol of acceptance on IPDC’s online application forms , herein representing Subscriber’s execution of an official Agreement/contract/subscription/documents as acceptance of services (“Solution”) procured herein with IPDC.

 

This Acceptable Use Policy (“Policy”) describes the conditions which prohibited uses of software or services, including any updates offered by IPDC from time to time or its affiliates (if any), and any user manuals and instructions provided with the Solution (“Documentation”).

 

The description or example as described in this Policy are not exhaustive. IPDC may amend or modify this Policy from time to time in the event of such update which may require modification of its policy to ensure compliance by posting a revised version on IPDC’s website.

 

The contents of this Policy dictates the obligation and the manner of use of the products or services procured by Subscriber(s). Subscriber(s) is advised to read the Policy carefully

 

In the event that your act is deemed as a violation of this Policy or to help others to do so, we may immediately suspend or terminate your account including the use of any or all of our Solutions without notice. For any terms not defined by this Policy, kindly refer to the Service Level Agreement (the “Agreement”) for the product(s) or service(s) procured.

 

1. You shall not make copy(s) or use any Solution or Documentation except as authorized by the Agreement or by a written permission granted by IPDC.

 

2. You shall not at any given time, disclose any details or technical information to any 3rd Party deemed confidential.

 

3. Safe and except necessary and to those whom You have authorized, You shall not, and shall not permit any third party to:-

 

•3.1 to excess your system by use of any authorization code, license number, username/password combination or other activation code or number supplied by IPDC in connection with the Solution (“Activation Code”) safe and except to your representative or technical personnel for;

•3.2 to disclose any Activation Code except to any party other than Vendor or Vendor’s designated representatives or technical personnel authorized by Vendor or You;

•3.3 safe and except as expressly authorized by law to grant the followings: -

(i) to reverse engineer, disassemble, decompile, translate, reconstruct, transform or extract any Solution or any portion of the Solution (including any related malware signatures and malware detection routines); or (ii) to change, to modify or otherwise to alter any Solution (including any related malware signatures and malware detection routines).

•3.4 except as authorized by an agreement, between You and IPDC or a 3rd Party managing your system, resell, distribute, broadcast, transmit, communicate, transfer, pledge, rent, share or sublicense any Solution;

•3.5 except as expressly authorized by an Agreement, the Applicable Conditions or another agreement between You and IPDC or any 3rd party , for use any Solution to manage the facilities of a third party or grant any third party access to or use of any Solution or application of the service provider or other similar basis;

•3.6 to use any 3rd party’s solution as a platform to provide or to build a product or service that competes with the Solution;

•3.7 to use or attempt to use any Solution with the intention to:

(i) Circumvent or to violate the terms of this Policy;

(ii) to upload, download, transmit, copy or store any information, data, or materials, or engage or assist in any activity, that may (a) deemed to have contain any unlawful, harmful, threatening, abusive, defamatory or otherwise objectionable material of any kind (b) infringe the intellectual property rights or other rights of any third party (c) have the potential to incite or produce conduct that is unlawful, harmful, threatening, abusive, harassing, tortious, defamatory, libelous, vulgar, obscene, invasive of another's privacy, hateful, or racially, ethnically, religiously or sexually discriminatory or otherwise objectionable (d) potentially may cause harm or attempt to harm others (e) to promote any illegal activities, to promote physical harm or injury against any individual or group (f) to impersonate any person(s) or entity or otherwise misrepresent your affiliation with a person or entity or assist any fraud, deception or theft (g) damage, disable or impair the operation of, or gain or attempt to gain unauthorized access, receipt, use, copying, alteration or destruction of or to, any property, Devices, software, services, networks or data by any means, including by hacking, phishing, spoofing or seeking to circumvent or defeat any firewalls, password protection or other information security protections or controls of whatever nature (h) in any way violate any applicable laws both domestic and international (I) forge headers or otherwise manipulate identifiers in order to disguise the origin of any content transmitted through the use of the Solution; (v) upload, post, email or otherwise transmit any unsolicited or unauthorized promotional materials, “junk mail,” “spam,” “chain letters,” or “pyramid schemes”.

•3.8. damage, disable or impair the operation of, or gain or attempt to gain unauthorized access to, any Solution or to any 3rd party’s property, Devices, software, services, networks or data connected to, or inter-operating with, such Solution, or to any content or data stored, accessed or delivered through such Solution, by any means, including by hacking, phishing, spoofing or seeking to circumvent or defeat any firewalls, password protection or other information security protections or controls of whatever nature;

• 3.9. to test or benchmark, for any Solution without Vendor’s prior written consent; or

•3.10. defeat or circumvent, attempt to defeat or circumvent, or authorize or assist any third party in defeating or circumventing controls on the use of copies of any Solution.

bottom of page