Please read this Acceptable Use Policy carefully before accessing or using web services or data  operated by Marcus & Pollack LLP. For purposes of this Acceptable Use Policy services or data  include services or data provided by or through our contractors or vendors. This Acceptable Use  Policy applies to all persons having access to our web services or data including, but not limited  our employees, consultants, contractors, vendors and clients.  

Services and data provided by us may only be used for lawful purposes. You agree to comply with  all applicable laws, rules, and regulations in connection with your use of the services and data. The  information and resources accessible through our firm is made available by our firm or its  consultants, contractors or vendors and are subject to your agreement to their terms and conditions  as modified from time to time. Any material or conduct that in our judgment violates this  Acceptable Use Policy in any manner may result in suspension or termination of the services or  removal of user’s access with or without notice. 

Violation of any of these guidelines is strictly prohibited and may result in the immediate  termination or suspension of the services you receive from company. You will remain solely liable  and responsible for your use of the services and any and all content that you display, upload,  download or transmit through the use of the services. “content” includes, without limitation, your  email, web pages, personal home pages, and domain names. 

Prohibited Use

Transmission, distribution, sale, or storage of any material in violation of any applicable law,  regulation, or the Acceptable Use Policy is prohibited. The following non-exhaustive list details  the kinds of illegal or harmful conduct that are prohibited. You may not use the services to publish  content or engage in activity that is harmful to others, or that would subject us to liability,  including, without limitation, in connection with any of the following, each of which is prohibited  under this Acceptable Use Policy: 

  • Distributing computer viruses, worms, Trojan horses, or other malicious code Promoting or facilitating violence or terrorist activities 
  • Infringing the intellectual property or other proprietary rights of others Unauthorized copying or sharing of data  

Additionally:  

  • You may use only the computers, computer accounts, and computer files for which you  have authorization. 
  • You agree not to violate the rules, regulations, or policies that apply to any third-party  network, server computer database, or website that you access by or through the services. 
  • You may not use another individual’s account, or attempt to capture or guess other users’  passwords. 
  • You are individually responsible for appropriate use of all resources assigned to you, 

including the computer, the network address or port, software and hardware. Therefore,  you are accountable to the firm for all use of such resources. As an authorized user of  resources, you may not enable unauthorized users to access the network by using a firm  computer or a personal computer that is connected to our network. 

  • The firm is bound by its contractual and license agreements respecting certain third-party  resources; you are expected to comply with all such agreements when using such  resources. 
  • You should make a reasonable effort to protect your passwords and to secure resources  against unauthorized use or access. You must configure hardware and software in a way  that reasonably prevents unauthorized users from accessing Brown’s network and  computing resources. 
  • You must not attempt to access restricted portions of the network, an operating system,  security software or other administrative applications without appropriate authorization by  the system owner or administrator. 
  • You must comply with the policies and guidelines for any specific set of resources to which  you have been granted access. When other policies are more restrictive than this policy,  the more restrictive policy takes precedence. 
  • You must not use our computing or network resources in conjunction with the execution  of programs, software, processes, or automated transaction-based commands that are  intended to disrupt (or that could reasonably be expected to disrupt) other computer or  network users, or damage or degrade performance, software or hardware components of a  system. 

System and Network Security and Integrity 

Violations of the firm or any third party’s server, system or network security through the use of the  services are prohibited, and may result in criminal and civil liability. The firm may investigate  incidents involving such violations. The firm may involve and cooperate with law enforcement if  a criminal violation is suspected. Examples of server, system or network security violations  include, without limitation, the following: 

  • Hacking. Unauthorized access to or use of data, systems, servers or networks, including  any attempt to probe, scan or test the vulnerability of a system, server or network or to  breach security or authentication measures without express authorization of the owner of  the system, server or network. 
  • Interception. Unauthorized monitoring of data or traffic on any network, server, or system  without express authorization of the owner of the system, server, or network. 
  • Intentional Interference. Interference with service to any user, host or network including,  without limitation, mail bombing, news bombing, other flooding techniques, deliberate  attempts to overload a system, broadcast attacks and any activity resulting in the crash of  a host. Intentional interference also means the use of any kind of program/script/command,  or send messages of any kind, designed to interfere with a user’s terminal session, via any  means, locally or by the Internet.
  • Falsification of Origin or Routing Information. Forging of any TCP-IP packet header,  email header or any part of a message header. Using, selling, or distributing in conjunction  with services any computer program designed to conceal the source or routing information  of electronic mail messages in a manner that falsifies an internet domain, header  information, date or time stamp, originating email address or other identifier. 
  • Avoiding System Restrictions. Using manual or electronic means to avoid any use  limitations placed on the Services such as timing out. 
  • Failure to Safeguard Accounts. Failing to prevent unauthorized access to accounts,  including any account passwords. 

Enforcement 

Your access to our services and data may be suspended or terminated with or without notice upon  any violation of this policy. Any violations may result in the immediate suspension or termination  of your access to our data. 

Reporting violations 

To report a violation of this policy, please contact any of the following: 

Financial Controller 

Managing Attorney 

Any Partner 

We reserve the right to change this policy at any given time, of which you will be promptly  updated.