Pythian Acceptable Use Policy
This Acceptable Use Policy (the “Policy”) describes prohibited uses of the Pythian services (the “Services”) and the website locate at http://pythian.com (the “Site”). Pythian may modify the terms of this Policy at any time by posting a revised version on the Site. By using the Services or the Site you agree to latest version of the Policy. Violation of the terms of this Policy may result in termination of your use of the Services.
No Illegal, Harmful, or Offensive Use or Content
You may not use, or encourage or facilitate others to use, the Services or the Site for: (1) any activities that are (a) illegal or violate the rights of others, (b) harmful to others or to Pythian’s operations and reputation, or (c) fraudulent; or (2) transmitting, storing, distributing, displaying or otherwise making available any content that (a) misappropriates or infringes the intellectual property rights of a third party, (b) may damage, interfere with, intercept or expropriate any systems, program or data, or (c) is defamatory, obscene, abusive, invasive of privacy or otherwise objectionable.
Any illegal, harmful or offensive use of the Services or the Site activity or content will entitle Pythian to suspend your use of the Services or the Site and remove any prohibited content from the Services or the Site.
No Security Violations
You may not use the Services to violate the security or integrity of any system, including without limitation, networks, computer systems, communications systems, software and devices. Prohibited activities include:
- Accessing any system without permission;
- Monitoring any system data without permission;
- Interfering with the system's performance and/or availability without permission;
- Introducing virus or malicious code into any system without permission;
- Targeting any system with Denial of Service (DoS) attack.
Vulnerability Bounty Program
Pythian takes security of its systems seriously. We ask for you to work with us, by reporting any vulnerabilities you identify in the Services or the Site via email at email@example.com, prior to public disclosure. Pythian will review all submitted reports and respond to you with the next steps in the process. Based on the severity and impact of the vulnerability submitted we may offer a reward.
Reporting Violations of this Policy
If you identify an activity or content that you believe violates this Policy, please report it to firstname.lastname@example.org. Our dedicated team will review it and take action to remediate the violation, as required.
Any violation of this Policy may be considered violation of any other agreement we have with you. Pythian reserves the right to investigate any violation of this Policy, and take any action required to remediate it, including termination of any existing agreements between you and Pythian.
© The Pythian Group Inc., 2017