Pega Products and Services Acceptable Use Policy
This Acceptable Use Policy (the "AUP") sets forth certain requirements for your organization and your end users that use any Pega products or services (collectively referred to as the “Services”). We may revise this AUP from time to time to add or modify restrictions. Violating this AUP may result in suspension or termination of services. You agree not to use or misuse the Services to affect the confidentiality, integrity or availability of any computer, network, software application, communications systems or network device (each a “System”).
UNLAWFUL AND OTHER USES WHICH ARE NOT PERMITTED: using the Services for any illegal, harmful, fraudulent, infringing or offensive use, or to display or to store or transmit content or data that is illegal, harmful, fraudulent, infringing or offensive use, or to use the Services or display, store, or transmit content or data that is invasive of privacy, infringing, obscene, libelous, or that is otherwise unlawful or tortious, or to carry out infringing or unlawful activities. Activities which are prohibited (except when specifically allowed as part of an approved vulnerability test which adheres to the Vulnerability Testing Policy) include but are not limited to the following:
- Unauthorized Access: accessing or using a System without permission including attempts to breach or otherwise circumvent any security or authentication measures. Also accessing or searching the Services by any means other than our publicly supported interfaces (for example, “scraping”);
- Interception: monitoring of data or traffic on a System without permission;
- Falsification of Origin: forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision;
- Tampering: access, tamper with, or use non-public areas or parts of the Services, or shared areas of the services where you are not authorized;
- Network Abuse: maliciously interfering with, degrading the performance of, or disrupting any user, host, or network. Network abuse activities which are forbidden include but are not limited to: Denial of Service (“DOS”); or other activity with the intent to overload, flood, or spam any part of the Services;
- Harmful Content: supplying content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots, or intentionally sending malware;
- Monitoring or Crawling: monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled;
- Intentional Interference: interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques;
- Operation of Certain Network Services: operating network services like open proxies, open mail relays, or open recursive domain name servers;
- Avoiding System Restrictions: using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions;
- Unauthorized Communications: sending, distributing, publishing or facilitating the sending of unsolicited or unauthorized communications, promotions or advertisements, or spam;
- Spoofing and Phishing: sending altered, deceptive or false source-identifying information, including "spoofing" or "phishing";
- Collection of Messages from another service provider: collecting replies to messages sent from another service provider if those messages violate this AUP or the acceptable use policy of that provider;
- Copy/Interface service: violating copyrights by copying service or interface to Services or permitting other individuals or entities to copy services;
- Abuse the Services: abusing the services in any manner that circumvents their intended use;
- Selling the services or services account information via unauthorized channels including, but not limited to, providing unauthorized access to or use of activation instructions;
- Use of Automated Means: using automated or other means to access the Services other than by using our official interface and/or APIs;
- Infringing Content: supplying content that infringes or misappropriates the intellectual property or proprietary rights of others;
- Illegal, Harmful or Fraudulent Activities: engaging in any activities that are illegal, that violate the rights of others, or that may be harmful to others, our operations or reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, Ponzi and pyramid schemes, phishing, or pharming;
- Offensive Content: supplying content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.
Pega has the right to investigate suspected violations of this AUP. In addition, Pega has the right to report suspected violations of this AUP to applicable law-enforcement authorities or third parties, and to cooperate with any investigation of illegal activities associated with use of these services, the systems or networks, or any violation of this AUP.