Customer agrees not to engage in, and will take reasonable steps to ensure that its authorized users do not engage in the following activities:
- License, sublicense, sell, resell, transfer, rent, lease, assign (except as provided in Section 14.6 (Assignment)), distribute, disclose, or otherwise commercially exploit or make available the Products or Services to any third party.
- Copy, record, extract, scrape, modify, or create derivative works based on the Products or Services.
- “Frame” or “mirror” the Products or Services on any other server or device.
- Access the Products or Services for benchmarking or competitive purposes or use them for application service provider, timesharing, service bureau purposes, or any purpose other than its own internal use.
- Attempt to decompile, disassemble, reverse engineer, or discover any source code or underlying ideas or algorithms of the Products or Services.
- Remove, obscure, or modify any copyright or other proprietary rights notice in the Products or Services.
- Use the Product or Service to send or store infringing, obscene, threatening, libelous, or otherwise unlawful material, including material that violates third-party privacy rights.
- Use the Product or Service to create, use, send, store, or run material containing software viruses, worms, Trojan horses, or engage in any malicious acts that disrupt the security, integrity, or operation of the Products or Services.
- Attempt to gain or permit unauthorized access to the Products or Services or related systems or networks, including conducting penetration testing, denial of service attacks, or similar efforts.
- Use the Products or Services in violation of applicable laws and regulations.
- Use the Products or Services in a deceptive manner or in a way that infringes, misappropriates, or violates the intellectual property rights of a third party.
- Knowingly permit or assist any other party (including any user) in engaging in any of the above activities.
Breach by Authorized User
Any failure by Customer’s authorized user to comply with the Agreement is considered a breach by Customer. Eventschwestern will not be liable for any damages incurred by Customer or any third party resulting from such a breach. Customer must promptly notify Eventschwestern and take all necessary steps to terminate an access ID if there is any compromise in its security or suspected unauthorized use.
Customer is solely responsible for the actions of its employees and agents using the Services on its behalf. This includes submitting, accepting, or rejecting requests for proposals (“RFPs”) and related communications with other users. Customer assumes all risks in dealing with other users and is responsible for all communications and, if applicable, separate contract executions. Any disputes related to a Service must be resolved directly between Customer and the third party. Eventschwestern is not responsible for any breaches by either party of transaction terms or related activities.
Server Location Acknowledgment
Customer acknowledges that Eventschwestern’s servers are located in the United States and Europe only. The Solutions are not intended for use in countries requiring personal data to remain on servers in another country (e.g., the Russian Federation or The People’s Republic of China). Customer agrees to use the Service in compliance with all applicable data privacy localization requirements. The use of Services within China carries inherent risks related to government rules and regulations, including access to telecommunication or internet services and data privacy and localization requirements. Customer acknowledges that its use of Services within China is at its own risk, and Eventschwestern is not liable for any damages arising from such use.
No Protected Information
Customer acknowledges that the Services do not require the provision of any Protected Information. Customer agrees not to upload, provide, or submit any Protected Information to the Solutions. Eventschwestern may suspend access to the Solutions if it has a good faith belief that Customer, its agents, or users have breached this restriction.
Third Party Content
Third-party data, content, materials, or software (“Third Party Content”) on the Eventschwestern website or through a Solution may be subject to third-party licenses. Customer acknowledges that Third Party Content licenses may be altered or revoked by the third-party licensor without constituting a breach of the Agreement unless there is a material reduction in functionality.
By executing the Agreement, Customer consents to receiving email communications from Eventschwestern regarding its products and services. This includes white papers, webcasts, videos, live events, and other marketing materials. Customer can withdraw this consent at any time by unsubscribing from these email communications.