Please read this Acceptable Use Policy carefully before accessing or using web services or data operated by Marcus & Pollack LLP. For purposes of this Acceptable Use Policy services or data include services or data provided by or through our contractors or vendors. This Acceptable Use Policy applies to all persons having access to our web services or data including, but not limited our employees, consultants, contractors, vendors and clients.
Services and data provided by us may only be used for lawful purposes. You agree to comply with all applicable laws, rules, and regulations in connection with your use of the services and data. The information and resources accessible through our firm is made available by our firm or its consultants, contractors or vendors and are subject to your agreement to their terms and conditions as modified from time to time. Any material or conduct that in our judgment violates this Acceptable Use Policy in any manner may result in suspension or termination of the services or removal of user’s access with or without notice.
Violation of any of these guidelines is strictly prohibited and may result in the immediate termination or suspension of the services you receive from company. You will remain solely liable and responsible for your use of the services and any and all content that you display, upload, download or transmit through the use of the services. “content” includes, without limitation, your email, web pages, personal home pages, and domain names.
Prohibited Use
Transmission, distribution, sale, or storage of any material in violation of any applicable law, regulation, or the Acceptable Use Policy is prohibited. The following non-exhaustive list details the kinds of illegal or harmful conduct that are prohibited. You may not use the services to publish content or engage in activity that is harmful to others, or that would subject us to liability, including, without limitation, in connection with any of the following, each of which is prohibited under this Acceptable Use Policy:
- Distributing computer viruses, worms, Trojan horses, or other malicious code
- Promoting or facilitating violence or terrorist activities
- Infringing the intellectual property or other proprietary rights of others
- Unauthorized copying or sharing of data
Additionally:
- You may use only the computers, computer accounts, and computer files for which you have authorization.
- You agree not to violate the rules, regulations, or policies that apply to any third-party network, server computer database, or website that you access by or through the services.
- You may not use another individual’s account, or attempt to capture or guess other users’ passwords.
- You are individually responsible for appropriate use of all resources assigned to you, including the computer, the network address or port, software and hardware. Therefore, you are accountable to the firm for all use of such resources. As an authorized user of resources, you may not enable unauthorized users to access the network by using a firm computer or a personal computer that is connected to our network.
- The firm is bound by its contractual and license agreements respecting certain third-party resources; you are expected to comply with all such agreements when using such resources.
- You should make a reasonable effort to protect your passwords and to secure resources against unauthorized use or access. You must configure hardware and software in a way that reasonably prevents unauthorized users from accessing Brown’s network and computing resources.
- You must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.
- You must comply with the policies and guidelines for any specific set of resources to which you have been granted access. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.
- You must not use our computing or network resources in conjunction with the execution of programs, software, processes, or automated transaction-based commands that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software or hardware components of a system.
System and Network Security and Integrity
Violations of the firm or any third party’s server, system or network security through the use of the services are prohibited, and may result in criminal and civil liability. The firm may investigate incidents involving such violations. The firm may involve and cooperate with law enforcement if a criminal violation is suspected. Examples of server, system or network security violations include, without limitation, the following:
- Hacking. Unauthorized access to or use of data, systems, servers or networks, including any attempt to probe, scan or test the vulnerability of a system, server or network or to breach security or authentication measures without express authorization of the owner of the system, server or network.
- Interception. Unauthorized monitoring of data or traffic on any network, server, or system without express authorization of the owner of the system, server, or network.
- Intentional Interference. Interference with service to any user, host or network including, without limitation, mail bombing, news bombing, other flooding techniques, deliberate attempts to overload a system, broadcast attacks and any activity resulting in the crash of a host. Intentional interference also means the use of any kind of program/script/command, or send messages of any kind, designed to interfere with a user’s terminal session, via any means, locally or by the Internet.
- Falsification of Origin or Routing Information. Forging of any TCP-IP packet header, email header or any part of a message header. Using, selling, or distributing in conjunction with services any computer program designed to conceal the source or routing information of electronic mail messages in a manner that falsifies an internet domain, header information, date or time stamp, originating email address or other identifier. • Avoiding System Restrictions. Using manual or electronic means to avoid any use limitations placed on the Services such as timing out.
- Failure to Safeguard Accounts. Failing to prevent unauthorized access to accounts, including any account passwords.
Enforcement
Your access to our services and data may be suspended or terminated with or without notice upon any violation of this policy. Any violations may result in the immediate suspension or termination of your access to our data.
We reserve the right to change this policy at any given time, of which you will be promptly updated.