Periscope Software
Acceptable Use Policy
Updated 24 June 2024
This Acceptable Use Policy (‘Policy’) outlines the acceptable use of Periscope Software (‘Hosted Services’). By accessing or using the Hosted Services, you agree to comply with this Policy.
1. Prohibited Activities
You must not use the Hosted Services to:
-
Violate any applicable local, state, national, or international law or regulation;
-
Transmit, distribute, or store any material that is illegal, harmful, abusive, obscene, or otherwise objectionable;
-
Engage in activities that infringe or misappropriate the intellectual property, privacy, publicity, or other legal rights of others;
-
Introduce malicious software such as viruses, worms, or Trojan horses;
-
Interfere with or disrupt the integrity or performance of the Hosted Services;
-
Attempt to gain unauthorised access to the Hosted Services, other user accounts, computer systems, or networks connected to the Hosted Services through hacking, password mining, or any other means;
-
Harvest, collect, or gather user data without consent; or
-
Engage in any activity that imposes an unreasonable or disproportionately large load on the infrastructure of the Hosted Services.
2. User Responsibilities
All users of the Hosted Services are responsible for:
-
Maintaining the confidentiality of your account information, including your username and password;
-
All activities that occur under your account;
-
Ensuring that all users who access the Hosted Services through your account comply with this Policy; and
-
Notifying Periscope immediately of any unauthorised use of your account or any other breach of security.
3. Content Restrictions
You agree not to upload, post, email, transmit or otherwise make available any content that:
-
Is unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, libelous, invasive of another's privacy;
-
Infringes any patent, trademark, trade secret, copyright, or other proprietary rights of any party; or
-
Contains software viruses or any other computer code, files, or programs designed to interrupt, destroy, or limit the functionality of any computer software or hardware or telecommunications equipment.
4. Enforcement and Termination
Periscope reserves the right to:
-
Investigate violations of this Policy of misuse of the Hosted Services;
-
Remove, disable access to, or modify any content or resource that violates this Policy; or
-
Terminate or suspend your access to all or part of the Services for any violation of this Policy.
5. Reporting Violations
If you become aware of any violation of this Policy, you must immediately notify Periscope by emailing [email protected]. Periscope may take action to mitigate or stop the violation.
6. Modifications to This Policy
Periscope may modify this Policy at any time by posting a revised version on Periscope’s website or through the Hosted Services. The revised Policy will become effective immediately upon posting. Your continued use of the Services following the posting of any changes constitutes acceptance of those changes.
7. Contact Periscope
If you have any questions or concerns about this Policy, you may contact Periscope at:
​
Periscope Corporation
Suite 1
5 Rose Street
Hawthorn East 3121
Victoria
Australia
​
​
​