Affluent Acceptable Use Policy Affluent Acceptable Use Policy – Affluent Analytics

Affluent’s Acceptable Use Policy for the Affluent Software-as-a-Service

Version 1.4

This Acceptable Use Policy (“Policy”) outlines unacceptable use of Affluent (the “Services”). This Policy is in addition to any other terms and conditions under which Affluent provides the Services to you.

Affluent may make reasonable modifications to this Policy from time to time by posting a new version of this document on the Affluent website at the current URL. Accordingly, we recommend that you visit the Affluent website regularly to ensure that your activities conform to the most recent version.

Questions about this Policy (e.g., whether any contemplated use is permitted) and reports of violations of this Policy should be directed to support@affluent.io.

Prohibited uses and activities include, without limitation, any use of the Services in a manner that involves, facilitates, or attempts any of the following:

(a) renting, leasing, or sublicensing the Services, in whole or in part, to a third party;
(b) incorporating the Services into any software product provided to a third party;
(c) reverse engineering, decompiling, disassembling, or otherwise seeking to obtain the source code or non-public APIs to the Services, except to the extent expressly permitted by applicable law (and then only upon advance notice to Affluent);
(d) copying, modifying or creating any derivative work of the Services or any documentation of the Services;
(e) removing or obscuring any proprietary or other notices contained in the Service (including any reports or data printed from the Services)
(e) violating any law of, or committing conduct that is tortuous or unlawful in, any applicable jurisdiction;
(f) obtaining unauthorized access to any system, network, service, or account;
(g) interfering with service to any user, site, account, system, or network by use of any program, script, command, or otherwise;
(h) introducing or activating any viruses, worms, harmful code and/or Trojan horses;