top of page

Periscope Software
Acceptable Use Policy

Updated 24 June 2024



This Acceptable Use Policy (‘Policy’) outlines the acceptable use of Periscope Software (‘Hosted Services’). By accessing or using the Hosted Services, you agree to comply with this Policy.


1. Prohibited Activities


You must not use the Hosted Services to:


  1. Violate any applicable local, state, national, or international law or regulation;

  2. Transmit, distribute, or store any material that is illegal, harmful, abusive, obscene, or otherwise objectionable;

  3. Engage in activities that infringe or misappropriate the intellectual property, privacy, publicity, or other legal rights of others;

  4. Introduce malicious software such as viruses, worms, or Trojan horses;

  5. Interfere with or disrupt the integrity or performance of the Hosted Services;

  6. Attempt to gain unauthorised access to the Hosted Services, other user accounts, computer systems, or networks connected to the Hosted Services through hacking, password mining, or any other means;

  7. Harvest, collect, or gather user data without consent; or

  8. Engage in any activity that imposes an unreasonable or disproportionately large load on the infrastructure of the Hosted Services.


2. User Responsibilities


All users of the Hosted Services are responsible for:


  1. Maintaining the confidentiality of your account information, including your username and password;

  2. All activities that occur under your account;

  3. Ensuring that all users who access the Hosted Services through your account comply with this Policy; and

  4. Notifying Periscope immediately of any unauthorised use of your account or any other breach of security.


3. Content Restrictions


You agree not to upload, post, email, transmit or otherwise make available any content that:


  1. Is unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, libelous, invasive of another's privacy;

  2. Infringes any patent, trademark, trade secret, copyright, or other proprietary rights of any party; or

  3. Contains software viruses or any other computer code, files, or programs designed to interrupt, destroy, or limit the functionality of any computer software or hardware or telecommunications equipment.


4. Enforcement and Termination


Periscope reserves the right to:


  1. Investigate violations of this Policy of misuse of the Hosted Services;

  2. Remove, disable access to, or modify any content or resource that violates this Policy; or

  3. Terminate or suspend your access to all or part of the Services for any violation of this Policy.


5. Reporting Violations


If you become aware of any violation of this Policy, you must immediately notify Periscope by emailing [email protected]. Periscope may take action to mitigate or stop the violation.


6. Modifications to This Policy


Periscope may modify this Policy at any time by posting a revised version on Periscope’s website or through the Hosted Services. The revised Policy will become effective immediately upon posting. Your continued use of the Services following the posting of any changes constitutes acceptance of those changes.


7. Contact Periscope


If you have any questions or concerns about this Policy, you may contact Periscope at:

Periscope Corporation
Suite 1

5 Rose Street

Hawthorn East 3121



[email protected]

bottom of page