Sift Acceptable Use Policy
Effective: January 1, 2020
In connection with your use of our services, in addition to your obligations under your agreement with Sift
(the “Agreement”), you agree that you will not engage in any of the activities below nor permit or encourage
any third party to do so. This policy may change as Sift grows, so please check back regularly for updates
and changes. Capitalized terms used below but not defined in this policy have the meanings set forth in the
Agreement. You will not:
-
knowingly or intentionally fail to implement the Software properly;
-
knowingly submit any information to the Sift Services that is false, incomplete, out-of-date, or misleading;
-
submit any sensitive personal information, such as full credit or debit card numbers, financial account
information, full government identification numbers, account passwords, health-related information,
information related to children under 13 (or in the EEA under 16) or any other information that deemed
“sensitive” or falling under “special categories” under applicable laws, rules or regulations; -
circumvent any access or use restrictions, data encryption, or content protection related to the Sift
Services, including accessing or using any undocumented Software or any Software not in strict compliance
with any documentation provided to you by Sift; -
reverse engineer, modify, adapt, or hack the Sift Services, or otherwise attempt to gain unauthorized
access to the Sift Services; -
participate in spidering, screen-scraping, database-scraping, harvesting e-mail addresses, wireless
addresses, other contact or personal information, or other content made available through the Sift
Services, or use any other automatic means of obtaining lists of users or other information from or
through the Sift Services, including without limitation any information residing on any server or database
connected to the Sift Services; -
copy, modify, or distribute the computer code used to generate web pages on the Sift Services, except to
the extent such restriction is not allowed by applicable laws, rules or regulations; -
access, tamper with, or use non-public areas of the Sift Services, Sift’s computer systems, or the
technical delivery systems of Sift’s providers; -
access or search the Sift Services with any engine, software, tool, agent, device, or mechanism other than
the software or search agents provided by Sift or other generally available third-party web browsers; -
probe, scan, or test the vulnerability of any system or network, or breach any security or authentication
measures; -
benchmark, test the capacity or limitations of, or interfere with the access of any user, host or network,
including, without limitation, sending a virus, overloading, flooding, spamming, or mail-bombing the Sift
Services; -
upload, post, transmit, or otherwise make available any content or information designed to interrupt,
interfere with, destroy or limit the functionality of any computer software or hardware or
telecommunications equipment, including the introduction of malicious code, such as viruses, worms, time
bombs, or Trojan horses; -
using any Software provided by Sift for any purpose other than your implementation of the Sift Services
under the terms of the Agreement; or -
using any data obtained through any Sift SDK-enabled application in any way the violates any individual’s
rights or any carrier requirements or other industry standards.