Acceptable Use Policy

Introduction

This Acceptable Use Policy (the "Policy") sets out the rules governing:

References in this Policy to the Customer are to any customer for the Services and any individual user of the Services.

General usage rules

The Customer must not use the Services in any way that causes, or may cause, damage to the Services or impairment of the availability or accessibility of the Services.

The Customer must not use the Services:

The Customer must ensure that all Content complies with the provisions of this Policy and the Law.

Unlawful Content

Content must not be illegal or unlawful, must not infringe any person's legal rights, and must not be capable of giving rise to legal action against any person (in each case in any jurisdiction and under any applicable law).

Content, and the use of Content by GLU in any manner licensed or otherwise authorised by the Customer, must not:

The Customer must ensure that Content is not and has never been the subject of any threatened or actual legal proceedings or other similar complaint.

Monitoring

The Customer acknowledges that GLU will actively monitor the use of the Services.

Data mining

The Customer must not conduct any systematic or automated data scraping, data mining, data extraction or data harvesting, or other systematic or automated data collection activity, by means of or in relation to the Services.

Hyperlinks

The Customer must not link to any material using or by means of the Services that would, if it were made available through the Services, breach the provisions of this Policy.

Harmful software

The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any viruses, worms, spyware, adware or other harmful or malicious software, programs, routines, applications or technologies.

The Content must not contain or consist of, and you must not promote or distribute by means of the Services, any software, programs, routines, applications or technologies that will or may have a material negative effect upon the performance of a computer or introduce material security risks to a computer.